Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2020-26145 (GCVE-0-2020-26145)
Vulnerability from cvelistv5
- n/a
| URL | Tags | ||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T15:49:07.134Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.fragattacks.com"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md"
},
{
"name": "[oss-security] 20210511 various 802.11 security issues - fragattacks.com",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2021/05/11/12"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-07-13T12:06:43",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.fragattacks.com"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md"
},
{
"name": "[oss-security] 20210511 various 802.11 security issues - fragattacks.com",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2021/05/11/12"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2020-26145",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.fragattacks.com",
"refsource": "MISC",
"url": "https://www.fragattacks.com"
},
{
"name": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md",
"refsource": "MISC",
"url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md"
},
{
"name": "[oss-security] 20210511 various 802.11 security issues - fragattacks.com",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2021/05/11/12"
},
{
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf",
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2020-26145",
"datePublished": "2021-05-11T19:35:10",
"dateReserved": "2020-09-29T00:00:00",
"dateUpdated": "2024-08-04T15:49:07.134Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2020-26145\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2021-05-11T20:15:08.873\",\"lastModified\":\"2024-11-21T05:19:21.910\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.\"},{\"lang\":\"es\",\"value\":\"Se detect\u00f3 un problema en los dispositivos Samsung Galaxy S3 i9305 versi\u00f3n 4.4.4. Las implementaciones de WEP, WPA, WPA2 y WPA3 aceptan segundos fragmentos de transmisi\u00f3n (o posteriores) incluso cuando se env\u00edan en texto plano y los procesan como tramas completas no fragmentados. Un adversario puede abusar de esto para inyectar paquetes de red arbitrarios independientemente de la configuraci\u00f3n de la red\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:A/AC:L/Au:N/C:N/I:P/A:N\",\"baseScore\":3.3,\"accessVector\":\"ADJACENT_NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":6.5,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:galaxy_i9305_firmware:4.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5CFC281-DDBA-4511-A271-FCFFA337E2B9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:samsung:galaxy_i9305:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79194A52-BFFC-448B-9032-F29D2A5971BE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:6gk5763-1al00-7da0_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.2\",\"matchCriteriaId\":\"9C148549-31FC-48E5-860B-56364F15A9A4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:6gk5763-1al00-7da0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72E99748-08CA-4515-B64B-A7696E7C9824\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:6gk5766-1ge00-7da0_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.2\",\"matchCriteriaId\":\"B6E3450B-8B5F-4510-8D07-1D5A1BA214E1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:6gk5766-1ge00-7da0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9A76803-CFF6-4A82-A5EC-10A3946A91D3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:6gk5766-1ge00-7db0_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.2\",\"matchCriteriaId\":\"7A9D34A4-CBF4-4B78-A20D-33DB7DD3609E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:6gk5766-1ge00-7db0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9AAE92C7-5197-48AA-9334-62D3E313F8AE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:6gk5766-1je00-7da0_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.2\",\"matchCriteriaId\":\"74D91A1E-53EE-482B-A3D1-53E955DCDE2E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:6gk5766-1je00-7da0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D4F2AD0-57B4-4947-8887-9F26C47909CB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:6gk5766-1ge00-7ta0_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.2\",\"matchCriteriaId\":\"DBD0BD5B-54E2-4A29-8AFE-D4796B65FA2B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:6gk5766-1ge00-7ta0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4450B377-C7C1-4225-9304-C4AC79AB7E71\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:6gk5766-1ge00-7tb0_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.2\",\"matchCriteriaId\":\"C8852F24-7613-43AA-A91C-4665721C75DA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:6gk5766-1ge00-7tb0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"802CE18D-AF89-46F3-82EF-83F9590A49DA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:6gk5766-1je00-7ta0_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.2\",\"matchCriteriaId\":\"B8040707-3EE4-48CD-BEB0-B11136EC1841\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:6gk5766-1je00-7ta0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFC81171-3522-4982-BFA8-940E161AF217\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:6gk5763-1al00-3aa0_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.2\",\"matchCriteriaId\":\"749D2AF5-A5A4-4CBF-98C9-A3AC9C55494E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:6gk5763-1al00-3aa0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E50D46EE-B0D0-4385-BF21-804CB1B9556C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:6gk5763-1al00-3da0_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.2\",\"matchCriteriaId\":\"05C27085-76D9-4185-A578-82B71A360731\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:6gk5763-1al00-3da0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"781FDDBB-8DCA-4B65-8906-E78FBE3CFDA1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:6gk5766-1ge00-3da0_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.2\",\"matchCriteriaId\":\"7A705BE0-37DB-4D49-AD50-B68CFE273C0D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:6gk5766-1ge00-3da0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C591807-63DE-40DC-8E0A-083080FDC6FC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:6gk5766-1ge00-3db0_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.2\",\"matchCriteriaId\":\"D66877F3-BA23-4FAE-8FFD-7E81332F58B6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:6gk5766-1ge00-3db0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"142E900D-63F3-4CC7-9E27-026B4C38A803\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:6gk5766-1je00-3da0_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.2\",\"matchCriteriaId\":\"800E0542-02E5-4390-9AF0-82F3DD0B2523\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:6gk5766-1je00-3da0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"420D0BD5-A206-4A3F-8978-6D0959CE4F14\"}]}]}],\"references\":[{\"url\":\"http://www.openwall.com/lists/oss-security/2021/05/11/12\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.fragattacks.com\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2021/05/11/12\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.fragattacks.com\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
}
}
rhsa-2021_4356
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n* kernel: out-of-bounds reads in pinctrl subsystem (CVE-2020-0427)\n* kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24502)\n* kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24503)\n* kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24504)\n* kernel: Fragmentation cache not cleared on reconnection (CVE-2020-24586)\n* kernel: Reassembling fragments encrypted under different keys (CVE-2020-24587)\n* kernel: wifi frame payload being parsed incorrectly as an L2 frame (CVE-2020-24588)\n* kernel: Forwarding EAPOL from unauthenticated wifi client (CVE-2020-26139)\n* kernel: accepting plaintext data frames in protected networks (CVE-2020-26140)\n* kernel: not verifying TKIP MIC of fragmented frames (CVE-2020-26141)\n* kernel: accepting fragmented plaintext frames in protected networks (CVE-2020-26143)\n* kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header (CVE-2020-26144)\n* kernel: accepting plaintext broadcast fragments as full frames (CVE-2020-26145)\n* kernel: powerpc: RTAS calls can be used to compromise kernel integrity (CVE-2020-27777)\n* kernel: locking inconsistency in tty_io.c and tty_jobctrl.c can lead to a read-after-free (CVE-2020-29660)\n* kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function via a long SSID value (CVE-2020-36158)\n* kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() (CVE-2020-36386)\n* kernel: Improper access control in BlueZ may allow information disclosure vulnerability. (CVE-2021-0129)\n* kernel: Use-after-free in ndb_queue_rq() in drivers/block/nbd.c (CVE-2021-3348)\n* kernel: Linux kernel eBPF RINGBUF map oversized allocation (CVE-2021-3489)\n* kernel: double free in bluetooth subsystem when the HCI device initialization fails (CVE-2021-3564)\n* kernel: use-after-free in function hci_sock_bound_ioctl() (CVE-2021-3573)\n* kernel: eBPF 32-bit source register truncation on div/mod (CVE-2021-3600)\n* kernel: DoS in rb_per_cpu_empty() (CVE-2021-3679)\n* kernel: Mounting overlayfs inside an unprivileged user namespace can reveal files (CVE-2021-3732)\n* kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt() (CVE-2021-20194)\n* kernel: Race condition in sctp_destroy_sock list_del (CVE-2021-23133)\n* kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode (CVE-2021-28950)\n* kernel: System crash in intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c (CVE-2021-28971)\n* kernel: protection can be bypassed to leak content of kernel memory (CVE-2021-29155)\n* kernel: improper input validation in tipc_nl_retrieve_key function in net/tipc/node.c (CVE-2021-29646)\n* kernel: lack a full memory barrier may lead to DoS (CVE-2021-29650)\n* kernel: local escalation of privileges in handling of eBPF programs (CVE-2021-31440)\n* kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory (CVE-2021-31829)\n* kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier (CVE-2021-33200)\n* kernel: reassembling encrypted fragments with non-consecutive packet numbers (CVE-2020-26146)\n* kernel: reassembling mixed encrypted/plaintext fragments (CVE-2020-26147)\n* kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check (CVE-2020-29368)\n* kernel: flowtable list del corruption with kernel BUG at lib/list_debug.c:50 (CVE-2021-3635)\n* kernel: NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c (CVE-2021-3659)\n* kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure (CVE-2021-20239)\n* kernel: out of bounds array access in drivers/md/dm-ioctl.c (CVE-2021-31916)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:4356",
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/"
},
{
"category": "external",
"summary": "1509204",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1509204"
},
{
"category": "external",
"summary": "1793880",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793880"
},
{
"category": "external",
"summary": "1816493",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816493"
},
{
"category": "external",
"summary": "1894101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894101"
},
{
"category": "external",
"summary": "1900844",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1900844"
},
{
"category": "external",
"summary": "1903244",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903244"
},
{
"category": "external",
"summary": "1906522",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906522"
},
{
"category": "external",
"summary": "1912683",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912683"
},
{
"category": "external",
"summary": "1913348",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913348"
},
{
"category": "external",
"summary": "1915825",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1915825"
},
{
"category": "external",
"summary": "1919893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919893"
},
{
"category": "external",
"summary": "1921958",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921958"
},
{
"category": "external",
"summary": "1923636",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1923636"
},
{
"category": "external",
"summary": "1930376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930376"
},
{
"category": "external",
"summary": "1930379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930379"
},
{
"category": "external",
"summary": "1930381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930381"
},
{
"category": "external",
"summary": "1933527",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1933527"
},
{
"category": "external",
"summary": "1939341",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1939341"
},
{
"category": "external",
"summary": "1941762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941762"
},
{
"category": "external",
"summary": "1941784",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941784"
},
{
"category": "external",
"summary": "1945345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945345"
},
{
"category": "external",
"summary": "1945388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945388"
},
{
"category": "external",
"summary": "1946965",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946965"
},
{
"category": "external",
"summary": "1948772",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1948772"
},
{
"category": "external",
"summary": "1951595",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951595"
},
{
"category": "external",
"summary": "1953847",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1953847"
},
{
"category": "external",
"summary": "1954588",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954588"
},
{
"category": "external",
"summary": "1957788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1957788"
},
{
"category": "external",
"summary": "1959559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959559"
},
{
"category": "external",
"summary": "1959642",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959642"
},
{
"category": "external",
"summary": "1959654",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959654"
},
{
"category": "external",
"summary": "1959657",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959657"
},
{
"category": "external",
"summary": "1959663",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959663"
},
{
"category": "external",
"summary": "1960490",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960490"
},
{
"category": "external",
"summary": "1960492",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960492"
},
{
"category": "external",
"summary": "1960496",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960496"
},
{
"category": "external",
"summary": "1960498",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960498"
},
{
"category": "external",
"summary": "1960500",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960500"
},
{
"category": "external",
"summary": "1960502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960502"
},
{
"category": "external",
"summary": "1960504",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960504"
},
{
"category": "external",
"summary": "1960708",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960708"
},
{
"category": "external",
"summary": "1964028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964028"
},
{
"category": "external",
"summary": "1964139",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964139"
},
{
"category": "external",
"summary": "1965038",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965038"
},
{
"category": "external",
"summary": "1965360",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965360"
},
{
"category": "external",
"summary": "1965458",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965458"
},
{
"category": "external",
"summary": "1966578",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966578"
},
{
"category": "external",
"summary": "1969489",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1969489"
},
{
"category": "external",
"summary": "1971101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971101"
},
{
"category": "external",
"summary": "1972278",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1972278"
},
{
"category": "external",
"summary": "1974627",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974627"
},
{
"category": "external",
"summary": "1975182",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975182"
},
{
"category": "external",
"summary": "1975949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975949"
},
{
"category": "external",
"summary": "1976679",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976679"
},
{
"category": "external",
"summary": "1976699",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976699"
},
{
"category": "external",
"summary": "1976946",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976946"
},
{
"category": "external",
"summary": "1976969",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976969"
},
{
"category": "external",
"summary": "1977162",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977162"
},
{
"category": "external",
"summary": "1977422",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977422"
},
{
"category": "external",
"summary": "1977537",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977537"
},
{
"category": "external",
"summary": "1977850",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977850"
},
{
"category": "external",
"summary": "1978369",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1978369"
},
{
"category": "external",
"summary": "1979070",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1979070"
},
{
"category": "external",
"summary": "1979680",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1979680"
},
{
"category": "external",
"summary": "1981954",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981954"
},
{
"category": "external",
"summary": "1986138",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986138"
},
{
"category": "external",
"summary": "1989165",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989165"
},
{
"category": "external",
"summary": "1989999",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989999"
},
{
"category": "external",
"summary": "1991976",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1991976"
},
{
"category": "external",
"summary": "1992700",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992700"
},
{
"category": "external",
"summary": "1995249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995249"
},
{
"category": "external",
"summary": "1996854",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1996854"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4356.json"
}
],
"title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2024-12-20T20:35:58+00:00",
"generator": {
"date": "2024-12-20T20:35:58+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.4"
}
},
"id": "RHSA-2021:4356",
"initial_release_date": "2021-11-09T18:06:54+00:00",
"revision_history": [
{
"date": "2021-11-09T18:06:54+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-11-09T18:06:54+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-20T20:35:58+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product": {
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-348.el8.aarch64",
"product": {
"name": "bpftool-0:4.18.0-348.el8.aarch64",
"product_id": "bpftool-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-core-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-debug-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-devel-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-headers-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-modules-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-tools-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-348.el8.aarch64",
"product": {
"name": "perf-0:4.18.0-348.el8.aarch64",
"product_id": "perf-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-348.el8.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-348.el8.aarch64",
"product_id": "python3-perf-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-348.el8.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-348.el8.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-348.el8?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-348.el8.ppc64le",
"product_id": "bpftool-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-core-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-debug-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-devel-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-headers-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-modules-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-tools-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "perf-0:4.18.0-348.el8.ppc64le",
"product_id": "perf-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-348.el8.ppc64le",
"product_id": "python3-perf-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-348.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-348.el8.x86_64",
"product": {
"name": "bpftool-0:4.18.0-348.el8.x86_64",
"product_id": "bpftool-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-core-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-debug-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-devel-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-headers-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-modules-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-tools-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-348.el8.x86_64",
"product": {
"name": "perf-0:4.18.0-348.el8.x86_64",
"product_id": "perf-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-348.el8.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-348.el8.x86_64",
"product_id": "python3-perf-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-348.el8.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-348.el8.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-348.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-348.el8.s390x",
"product": {
"name": "bpftool-0:4.18.0-348.el8.s390x",
"product_id": "bpftool-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-0:4.18.0-348.el8.s390x",
"product_id": "kernel-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-core-0:4.18.0-348.el8.s390x",
"product_id": "kernel-core-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-348.el8.s390x",
"product_id": "kernel-debug-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-348.el8.s390x",
"product_id": "kernel-debug-core-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-348.el8.s390x",
"product_id": "kernel-devel-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-348.el8.s390x",
"product_id": "kernel-headers-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-348.el8.s390x",
"product_id": "kernel-modules-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-348.el8.s390x",
"product_id": "kernel-tools-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-348.el8.s390x",
"product": {
"name": "perf-0:4.18.0-348.el8.s390x",
"product_id": "perf-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-348.el8.s390x",
"product": {
"name": "python3-perf-0:4.18.0-348.el8.s390x",
"product_id": "python3-perf-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-348.el8.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-348.el8.s390x",
"product_id": "perf-debuginfo-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-348.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-348.el8.src",
"product": {
"name": "kernel-0:4.18.0-348.el8.src",
"product_id": "kernel-0:4.18.0-348.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-348.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"product": {
"name": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"product_id": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-stablelists@4.18.0-348.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-348.el8.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-348.el8.noarch",
"product_id": "kernel-doc-0:4.18.0-348.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-348.el8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64"
},
"product_reference": "bpftool-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x"
},
"product_reference": "bpftool-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64"
},
"product_reference": "bpftool-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src"
},
"product_reference": "kernel-0:4.18.0-348.el8.src",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-core-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-348.el8.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-348.el8.noarch",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64"
},
"product_reference": "perf-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "perf-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x"
},
"product_reference": "perf-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64"
},
"product_reference": "perf-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x"
},
"product_reference": "python3-perf-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64"
},
"product_reference": "bpftool-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x"
},
"product_reference": "bpftool-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64"
},
"product_reference": "bpftool-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.el8.src as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src"
},
"product_reference": "kernel-0:4.18.0-348.el8.src",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-core-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-348.el8.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-348.el8.noarch",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64"
},
"product_reference": "perf-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "perf-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x"
},
"product_reference": "perf-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64"
},
"product_reference": "perf-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x"
},
"product_reference": "python3-perf-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-14615",
"cwe": {
"id": "CWE-212",
"name": "Improper Removal of Sensitive Information Before Storage or Transfer"
},
"discovery_date": "2020-01-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1789209"
}
],
"notes": [
{
"category": "description",
"text": "An information disclosure flaw was found in the Linux kernel. The i915 graphics driver lacks control of flow for data structures which may allow a local, authenticated user to disclose information when using ioctl commands with an attached i915 device. The highest threat from this vulnerability is to data confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Intel graphics card information leak.",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, 8 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 6, 7, and 8 may address this issue.\n\nThis has been rated as having Moderate security impact and is not currently planned to be addressed in future updates of Red Hat Enterprise MRG 2.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-14615"
},
{
"category": "external",
"summary": "RHBZ#1789209",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789209"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-14615",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14615"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14615",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14615"
}
],
"release_date": "2020-01-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Preventing loading of the i915 kernel module will prevent attackers from using this exploit against the system; however, the power management functionality of the card will be disabled and the system may draw additional power. See the kcs \u201cHow do I blacklist a kernel module to prevent it from loading automatically?\u201c (https://access.redhat.com/solutions/41278) for instructions on how to disable a kernel module from autoloading. Graphical displays may also be at low resolution or not work correctly.\n\nThis mitigation may not be suitable if the graphical login functionality is required.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Intel graphics card information leak."
},
{
"cve": "CVE-2020-0427",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-01-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1919893"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux pinctrl system. It is possible to trigger an of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds reads in pinctrl subsystem.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-0427"
},
{
"category": "external",
"summary": "RHBZ#1919893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919893"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-0427",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0427"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0427",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0427"
}
],
"release_date": "2020-11-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: out-of-bounds reads in pinctrl subsystem."
},
{
"cve": "CVE-2020-24502",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-02-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1930379"
}
],
"notes": [
{
"category": "description",
"text": "Improper input validation in some Intel(R) Ethernet E810 Adapter drivers for Linux may allow an authenticated user to potentially enable a denial of service via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24502"
},
{
"category": "external",
"summary": "RHBZ#1930379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930379"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24502",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24502"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24502",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24502"
}
],
"release_date": "2021-02-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers"
},
{
"cve": "CVE-2020-24503",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-02-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1930381"
}
],
"notes": [
{
"category": "description",
"text": "Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers for Linux may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24503"
},
{
"category": "external",
"summary": "RHBZ#1930381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930381"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24503",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24503"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24503",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24503"
}
],
"release_date": "2021-02-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers"
},
{
"cve": "CVE-2020-24504",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-02-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1930376"
}
],
"notes": [
{
"category": "description",
"text": "An uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers for Linux may allow an authenticated user to potentially cause a denial of service via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24504"
},
{
"category": "external",
"summary": "RHBZ#1930376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930376"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24504",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24504"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24504",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24504"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html"
}
],
"release_date": "2021-02-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers"
},
{
"cve": "CVE-2020-24586",
"cwe": {
"id": "CWE-212",
"name": "Improper Removal of Sensitive Information Before Storage or Transfer"
},
"discovery_date": "2021-05-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1959642"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernels implementation of wifi fragmentation handling. An attacker with the ability to transmit within the wireless transmission range of an access point can abuse a flaw where previous contents of wifi fragments can be unintentionally transmitted to another device.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Fragmentation cache not cleared on reconnection",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "RHBZ#1959642",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959642"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24586"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/"
}
],
"release_date": "2021-05-12T01:20:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Fragmentation cache not cleared on reconnection"
},
{
"cve": "CVE-2020-24587",
"cwe": {
"id": "CWE-345",
"name": "Insufficient Verification of Data Authenticity"
},
"discovery_date": "2021-05-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1959654"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u0027s WiFi implementation. An attacker within the wireless range can abuse a logic flaw in the WiFi implementation by reassembling packets from multiple fragments under different keys, treating them as valid. This flaw allows an attacker to send a fragment under an incorrect key, treating them as a valid fragment under the new key. The highest threat from this vulnerability is to confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Reassembling fragments encrypted under different keys",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "RHBZ#1959654",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959654"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24587",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24587"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24587",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24587"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/"
}
],
"release_date": "2021-05-11T14:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.1,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Reassembling fragments encrypted under different keys"
},
{
"cve": "CVE-2020-24588",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-05-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1959657"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernels wifi implementation. An attacker within wireless broadcast range can inject custom data into the wireless communication circumventing checks on the data. This can cause the frame to pass checks and be considered a valid frame of a different type.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: wifi frame payload being parsed incorrectly as an L2 frame",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "RHBZ#1959657",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959657"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24588",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24588"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24588",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24588"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.25d93176ddaf.I9e265b597f2cd23eb44573f35b625947b386a9de@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.25d93176ddaf.I9e265b597f2cd23eb44573f35b625947b386a9de@changeid/"
}
],
"release_date": "2021-05-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: wifi frame payload being parsed incorrectly as an L2 frame"
},
{
"cve": "CVE-2020-26139",
"cwe": {
"id": "CWE-829",
"name": "Inclusion of Functionality from Untrusted Control Sphere"
},
"discovery_date": "2021-05-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1959663"
}
],
"notes": [
{
"category": "description",
"text": "Frames used for authentication and key management between the AP and connected clients. Some clients may take these redirected frames masquerading as control mechanisms from the AP.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Forwarding EAPOL from unauthenticated wifi client",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26139"
},
{
"category": "external",
"summary": "RHBZ#1959663",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959663"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26139"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26139",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26139"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.cb327ed0cabe.Ib7dcffa2a31f0913d660de65ba3c8aca75b1d10f@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.cb327ed0cabe.Ib7dcffa2a31f0913d660de65ba3c8aca75b1d10f@changeid/"
}
],
"release_date": "2021-05-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Forwarding EAPOL from unauthenticated wifi client"
},
{
"cve": "CVE-2020-26140",
"cwe": {
"id": "CWE-346",
"name": "Origin Validation Error"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960490"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Linux kernel. Where the WiFi implementations accept plaintext frames in a protected WiFi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: accepting plaintext data frames in protected networks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26140"
},
{
"category": "external",
"summary": "RHBZ#1960490",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960490"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26140",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26140"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26140",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26140"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: accepting plaintext data frames in protected networks"
},
{
"cve": "CVE-2020-26141",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960492"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Linux kernel\u0027s WiFi implementation. An attacker within wireless range can inject a control packet fragment where the kernel does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: not verifying TKIP MIC of fragmented frames",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "RHBZ#1960492",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960492"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26141"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26141",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26141"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.c3f1d42c6746.I795593fcaae941c471425b8c7d5f7bb185d29142@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.c3f1d42c6746.I795593fcaae941c471425b8c7d5f7bb185d29142@changeid/"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: not verifying TKIP MIC of fragmented frames"
},
{
"cve": "CVE-2020-26143",
"cwe": {
"id": "CWE-346",
"name": "Origin Validation Error"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960496"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Linux kernel, where the WiFi implementations assemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: accepting fragmented plaintext frames in protected networks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26143"
},
{
"category": "external",
"summary": "RHBZ#1960496",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960496"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26143",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26143"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26143",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26143"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: accepting fragmented plaintext frames in protected networks"
},
{
"cve": "CVE-2020-26144",
"cwe": {
"id": "CWE-290",
"name": "Authentication Bypass by Spoofing"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960498"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel, where the WiFi implementations accept plaintext A-MSDU frames as long as the first 8 bytes correspond to a valid RFC1042 (ex., LLC/SNAP) header for EAPOL. The highest threat from this vulnerability is to integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26144"
},
{
"category": "external",
"summary": "RHBZ#1960498",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960498"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26144",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26144"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26144",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26144"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header"
},
{
"cve": "CVE-2020-26145",
"cwe": {
"id": "CWE-307",
"name": "Improper Restriction of Excessive Authentication Attempts"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960500"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in ath10k_htt_rx_proc_rx_frag_ind_hl in drivers/net/wireless/ath/ath10k/htt_rx.c in the Linux kernel WiFi implementations, where it accepts a second (or subsequent) broadcast fragments even when sent in plaintext and then process them as full unfragmented frames. The highest threat from this vulnerability is to integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: accepting plaintext broadcast fragments as full frames",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26145"
},
{
"category": "external",
"summary": "RHBZ#1960500",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960500"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26145"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26145",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26145"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.9ca6ca7945a9.I1e18b514590af17c155bda86699bc3a971a8dcf4@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.9ca6ca7945a9.I1e18b514590af17c155bda86699bc3a971a8dcf4@changeid/"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: accepting plaintext broadcast fragments as full frames"
},
{
"cve": "CVE-2020-26146",
"cwe": {
"id": "CWE-307",
"name": "Improper Restriction of Excessive Authentication Attempts"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960502"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Linux kernel, where the WiFi implementation reassemble fragments with non-consecutive packet numbers. An adversary can abuse this to exfiltrate selected fragments. This vulnerability is exploitable when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used. Note that WEP is vulnerable to this attack by design.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: reassembling encrypted fragments with non-consecutive packet numbers",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26146"
},
{
"category": "external",
"summary": "RHBZ#1960502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960502"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26146"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26146",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26146"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: reassembling encrypted fragments with non-consecutive packet numbers"
},
{
"cve": "CVE-2020-26147",
"cwe": {
"id": "CWE-307",
"name": "Improper Restriction of Excessive Authentication Attempts"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960504"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in ieee80211_rx_h_defragment in net/mac80211/rx.c in the Linux Kernel\u0027s WiFi implementation. This vulnerability can be abused to inject packets or exfiltrate selected fragments when another device sends fragmented frames, and the WEP, CCMP, or GCMP data-confidentiality protocol is used. The highest threat from this vulnerability is to integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: reassembling mixed encrypted/plaintext fragments",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26147"
},
{
"category": "external",
"summary": "RHBZ#1960504",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960504"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26147",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26147"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.30c4394bb835.I5acfdb552cc1d20c339c262315950b3eac491397@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.30c4394bb835.I5acfdb552cc1d20c339c262315950b3eac491397@changeid/"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: reassembling mixed encrypted/plaintext fragments"
},
{
"acknowledgments": [
{
"names": [
"Daniel Axtens"
],
"organization": "IBM"
}
],
"cve": "CVE-2020-27777",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"discovery_date": "2020-10-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1900844"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: powerpc: RTAS calls can be used to compromise kernel integrity",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having Moderate impact due to the required privileges and hardware dependencies.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-27777"
},
{
"category": "external",
"summary": "RHBZ#1900844",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1900844"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-27777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27777"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27777",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27777"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?h=next\u0026id=bd59380c5ba4147dcbaad3e582b55ccfd120b764",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?h=next\u0026id=bd59380c5ba4147dcbaad3e582b55ccfd120b764"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2020/10/09/1",
"url": "https://www.openwall.com/lists/oss-security/2020/10/09/1"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2020/11/23/2",
"url": "https://www.openwall.com/lists/oss-security/2020/11/23/2"
}
],
"release_date": "2020-10-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: powerpc: RTAS calls can be used to compromise kernel integrity"
},
{
"cve": "CVE-2020-29368",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-12-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903244"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw has been rated as having Moderateimpact because, based on Red Hat\u0027s assessment, this issue is hard to exploit in practice because the race window is too small for it to be reliable.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-29368"
},
{
"category": "external",
"summary": "RHBZ#1903244",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903244"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-29368",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29368"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29368",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29368"
}
],
"release_date": "2020-06-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check"
},
{
"cve": "CVE-2020-29660",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2020-12-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1906522"
}
],
"notes": [
{
"category": "description",
"text": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel. A local user could use this flaw to read numerical value from memory after free.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: locking inconsistency in drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c can lead to a read-after-free",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having Low impact (Red Hat Enterprise Linux 7) because of the need to have CAP_SYS_TTY_CONFIG privileges.\n\nThis flaw is rated as having Moderate (Red Hat Enterprise Linux 8) impact because of the need to have CAP_SYS_TTY_CONFIG privileges. Red Hat Enterprise Linux 8 enabled unprivileged user/network namespaces by default which can be used to exercise this vulnerability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-29660"
},
{
"category": "external",
"summary": "RHBZ#1906522",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906522"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-29660",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29660"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29660",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29660"
}
],
"release_date": "2020-12-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: locking inconsistency in drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c can lead to a read-after-free"
},
{
"cve": "CVE-2020-36158",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2021-01-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1913348"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. The marvell wifi driver could allow a local attacker to execute arbitrary code via a long SSID value in mwifiex_cmd_802_11_ad_hoc_start function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function in drivers/net/wireless/marvell/mwifiex/join.c via a long SSID value",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having Moderate impact because the attacker needs to be local and privileged enough to be able to initiate ad-hoc WIFI network creation.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36158"
},
{
"category": "external",
"summary": "RHBZ#1913348",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913348"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36158",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36158"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36158",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36158"
}
],
"release_date": "2020-12-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module mwifiex from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function in drivers/net/wireless/marvell/mwifiex/join.c via a long SSID value"
},
{
"cve": "CVE-2020-36312",
"cwe": {
"id": "CWE-772",
"name": "Missing Release of Resource after Effective Lifetime"
},
"discovery_date": "2021-04-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1947991"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the KVM hypervisor of the Linux kernel. A memory leak could occur in kvm_io_bus_unregister_dev() upon a kmalloc failure. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: memory leak upon a kmalloc failure in kvm_io_bus_unregister_dev function in virt/kvm/kvm_main.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36312"
},
{
"category": "external",
"summary": "RHBZ#1947991",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1947991"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36312",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36312"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36312",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36312"
}
],
"release_date": "2020-09-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: memory leak upon a kmalloc failure in kvm_io_bus_unregister_dev function in virt/kvm/kvm_main.c"
},
{
"cve": "CVE-2020-36386",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2021-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1969489"
}
],
"notes": [
{
"category": "description",
"text": "A flaw out of bounds memory access in the Linux kernel bluetooth subsystem was found in the way when some data being read about the bluetooth device with the hci_extended_inquiry_result_evt call. A local user could use this flaw to crash the system or read some data out of memory bounds that can lead to data confidentiality threat.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() in net/bluetooth/hci_event.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having a Moderate impact because even the data being read out of memory bounds is written to some cache, it was known before that this data from non-safe source and as result no any sensitive dependencies on this data.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36386"
},
{
"category": "external",
"summary": "RHBZ#1969489",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1969489"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36386",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36386"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36386",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36386"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51c19bf3d5cfaa66571e4b88ba2a6f6295311101",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51c19bf3d5cfaa66571e4b88ba2a6f6295311101"
}
],
"release_date": "2020-07-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module bluetooth from being loaded (if Bluetooth not required for the system). Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() in net/bluetooth/hci_event.c"
},
{
"cve": "CVE-2021-0129",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965038"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access. The highest threat from this vulnerability is to data confidentiality and integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper access control in BlueZ may allow information disclosure vulnerability.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0129"
},
{
"category": "external",
"summary": "RHBZ#1965038",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965038"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0129"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0129",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0129"
}
],
"release_date": "2021-06-08T03:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Improper access control in BlueZ may allow information disclosure vulnerability."
},
{
"cve": "CVE-2021-3348",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-01-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1921958"
}
],
"notes": [
{
"category": "description",
"text": "A use after free flaw in the Linux kernel network block device (NBD) subsystem was found in the way user calls an ioctl NBD_SET_SOCK at a certain point during device setup.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use-after-free in ndb_queue_rq() in drivers/block/nbd.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having a Moderate impact because in the default configuration, the issue can only be triggered by a privileged local user (with access to the nbd device).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3348"
},
{
"category": "external",
"summary": "RHBZ#1921958",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921958"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3348",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3348"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3348",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3348"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-block/24dff677353e2e30a71d8b66c4dffdbdf77c4dbd.1611595239.git.josef@toxicpanda.com/",
"url": "https://lore.kernel.org/linux-block/24dff677353e2e30a71d8b66c4dffdbdf77c4dbd.1611595239.git.josef@toxicpanda.com/"
}
],
"release_date": "2021-01-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module nbd from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Use-after-free in ndb_queue_rq() in drivers/block/nbd.c"
},
{
"acknowledgments": [
{
"names": [
"Ryota Shiga"
]
}
],
"cve": "CVE-2021-3489",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1959559"
}
],
"notes": [
{
"category": "description",
"text": "A flaw out of bound memory write in the Linux kernel BPF subsystem was found in the way user writes to BPF ring buffer too fast, so larger buffer than available memory could be allocated. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Linux kernel eBPF RINGBUF map oversized allocation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3489"
},
{
"category": "external",
"summary": "RHBZ#1959559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959559"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3489",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3489"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3489",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3489"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=4b81ccebaeee885ab1aa1438133f2991e3a2b6ea",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=4b81ccebaeee885ab1aa1438133f2991e3a2b6ea"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/05/11/10",
"url": "https://www.openwall.com/lists/oss-security/2021/05/11/10"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Linux kernel eBPF RINGBUF map oversized allocation"
},
{
"acknowledgments": [
{
"names": [
"HaoXiong, LinMa"
],
"organization": "ckSec"
}
],
"cve": "CVE-2021-3564",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"discovery_date": "2021-05-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1964139"
}
],
"notes": [
{
"category": "description",
"text": "A flaw double-free memory corruption in the Linux kernel HCI device initialization subsystem was found in the way user attach malicious HCI TTY Bluetooth device. A local user could use this flaw to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: double free in bluetooth subsystem when the HCI device initialization fails",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The impact is Moderate, because the double free happens during flush procedure, and no use of incorrect data during flush finishing even if double free could happen without kernel crash.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3564"
},
{
"category": "external",
"summary": "RHBZ#1964139",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964139"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3564"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3564",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3564"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/05/25/1",
"url": "https://www.openwall.com/lists/oss-security/2021/05/25/1"
}
],
"release_date": "2021-05-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: double free in bluetooth subsystem when the HCI device initialization fails"
},
{
"cve": "CVE-2021-3573",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1966578"
}
],
"notes": [
{
"category": "description",
"text": "A flaw use-after-free in function hci_sock_bound_ioctl() of the Linux kernel HCI subsystem was found in the way user calls ioct HCIUNBLOCKADDR or other way triggers race condition of the call hci_unregister_dev() together with one of the calls hci_sock_blacklist_add(), hci_sock_blacklist_del(), hci_get_conn_info(), hci_get_auth_info(). A privileged local user could use this flaw to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in function hci_sock_bound_ioctl()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having a Moderate impact because of the privileges (CAP_NET_ADMIN in initial namespace) required for exploiting the issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3573"
},
{
"category": "external",
"summary": "RHBZ#1966578",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966578"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3573",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3573"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth.git/commit/?id=e305509e678b3a4af2b3cfd410f409f7cdaabb52",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth.git/commit/?id=e305509e678b3a4af2b3cfd410f409f7cdaabb52"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/06/08/2",
"url": "https://www.openwall.com/lists/oss-security/2021/06/08/2"
}
],
"release_date": "2021-06-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising easThe required privileges is CAP_NET_ADMIN capabilities. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.e of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in function hci_sock_bound_ioctl()"
},
{
"cve": "CVE-2021-3600",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1981954"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s eBPF verification code, where the eBPF 32-bit div/mod source register truncation could lead to out-of-bounds reads and writes. By default, accessing the eBPF verifier is only possible to privileged users with CAP_SYS_ADMIN. This flaw allows a local user who can run eBPF instructions to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: eBPF 32-bit source register truncation on div/mod",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3600"
},
{
"category": "external",
"summary": "RHBZ#1981954",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981954"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3600"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3600",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3600"
},
{
"category": "external",
"summary": "https://lore.kernel.org/patchwork/patch/1379497/",
"url": "https://lore.kernel.org/patchwork/patch/1379497/"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/06/23/1",
"url": "https://www.openwall.com/lists/oss-security/2021/06/23/1"
}
],
"release_date": "2021-06-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: eBPF 32-bit source register truncation on div/mod"
},
{
"cve": "CVE-2021-3635",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-06-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1976946"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel netfilter implementation. A user with root (CAP_SYS_ADMIN) access is able to panic the system when issuing netfilter netflow commands",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: flowtable list del corruption with kernel BUG at lib/list_debug.c:50",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3635"
},
{
"category": "external",
"summary": "RHBZ#1976946",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976946"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3635",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3635"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3635",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3635"
}
],
"release_date": "2021-08-06T04:47:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: flowtable list del corruption with kernel BUG at lib/list_debug.c:50"
},
{
"cve": "CVE-2021-3659",
"cwe": {
"id": "CWE-252",
"name": "Unchecked Return Value"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1975949"
}
],
"notes": [
{
"category": "description",
"text": "A NULL pointer dereference flaw was found in the Linux kernel\u2019s IEEE 802.15.4 wireless networking subsystem in the way the user closes the LR-WPAN connection. This flaw allows a local user to crash the system. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3659"
},
{
"category": "external",
"summary": "RHBZ#1975949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975949"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3659",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3659"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3659",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3659"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8"
}
],
"release_date": "2021-04-06T19:22:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module mac802154 from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c"
},
{
"acknowledgments": [
{
"names": [
"Haoran Luo"
],
"organization": "Chaitin Tech"
}
],
"cve": "CVE-2021-3679",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-07-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1989165"
}
],
"notes": [
{
"category": "description",
"text": "A lack of CPU resources in the Linux kernel tracing module functionality was found in the way users use the trace ring buffer in specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: DoS in rb_per_cpu_empty()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3679"
},
{
"category": "external",
"summary": "RHBZ#1989165",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989165"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3679",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3679"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3679",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3679"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20210723125527.767d1c18@oasis.local.home/",
"url": "https://lore.kernel.org/lkml/20210723125527.767d1c18@oasis.local.home/"
}
],
"release_date": "2021-07-20T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: DoS in rb_per_cpu_empty()"
},
{
"acknowledgments": [
{
"names": [
"Miklos Szeredi"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2021-3732",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-08-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1995249"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s OverlayFS subsystem in the way the user mounts the TmpFS filesystem with OverlayFS. This flaw allows a local user to gain access to hidden files that should not be accessible.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: overlayfs: Mounting overlayfs inside an unprivileged user namespace can reveal files",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3732"
},
{
"category": "external",
"summary": "RHBZ#1995249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995249"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3732",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3732"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3732",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3732"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=427215d85e8d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=427215d85e8d"
}
],
"release_date": "2021-08-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: overlayfs: Mounting overlayfs inside an unprivileged user namespace can reveal files"
},
{
"cve": "CVE-2021-4442",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-08-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2308455"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: add sanity tests to TCP_QUEUE_SEQ\n\nQingyu Li reported a syzkaller bug where the repro\nchanges RCV SEQ _after_ restoring data in the receive queue.\n\nmprotect(0x4aa000, 12288, PROT_READ) = 0\nmmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000\nmmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000\nmmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000\nsocket(AF_INET6, SOCK_STREAM, IPPROTO_IP) = 3\nsetsockopt(3, SOL_TCP, TCP_REPAIR, [1], 4) = 0\nconnect(3, {sa_family=AF_INET6, sin6_port=htons(0), sin6_flowinfo=htonl(0), inet_pton(AF_INET6, \"::1\", \u0026sin6_addr), sin6_scope_id=0}, 28) = 0\nsetsockopt(3, SOL_TCP, TCP_REPAIR_QUEUE, [1], 4) = 0\nsendmsg(3, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base=\"0x0000000000000003\\0\\0\", iov_len=20}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, 0) = 20\nsetsockopt(3, SOL_TCP, TCP_REPAIR, [0], 4) = 0\nsetsockopt(3, SOL_TCP, TCP_QUEUE_SEQ, [128], 4) = 0\nrecvfrom(3, NULL, 20, 0, NULL, NULL) = -1 ECONNRESET (Connection reset by peer)\n\nsyslog shows:\n[ 111.205099] TCP recvmsg seq # bug 2: copied 80, seq 0, rcvnxt 80, fl 0\n[ 111.207894] WARNING: CPU: 1 PID: 356 at net/ipv4/tcp.c:2343 tcp_recvmsg_locked+0x90e/0x29a0\n\nThis should not be allowed. TCP_QUEUE_SEQ should only be used\nwhen queues are empty.\n\nThis patch fixes this case, and the tx path as well.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: add sanity tests to TCP_QUEUE_SEQ",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is fixed in RHEL-8.5 and above\n~~~\nin (rhel-8.5, rhel-8.6, rhel-8.7, rhel-8.8, rhel-8.9, rhel-8.10) tcp: add sanity tests to TCP_QUEUE_SEQ\n~~~",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4442"
},
{
"category": "external",
"summary": "RHBZ#2308455",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2308455"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4442",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4442"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4442",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4442"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024082945-CVE-2021-4442-0a5f@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024082945-CVE-2021-4442-0a5f@gregkh/T"
}
],
"release_date": "2024-08-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: add sanity tests to TCP_QUEUE_SEQ"
},
{
"acknowledgments": [
{
"names": [
"Loris Reiff"
]
}
],
"cve": "CVE-2021-20194",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2020-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1912683"
}
],
"notes": [
{
"category": "description",
"text": "A flaw buffer overflow in the Linux kernel BPF subsystem was found in the way user running BPF script calling getsockopt. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having Moderate impact because of the need to have elevated privileges or non-standard configuration for running BPF script.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-20194"
},
{
"category": "external",
"summary": "RHBZ#1912683",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912683"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-20194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20194"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20194",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20194"
}
],
"release_date": "2021-01-22T10:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\n\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt()"
},
{
"cve": "CVE-2021-20239",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1923636"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the BPF protocol. This flaw allows an attacker with a local account to leak information about kernel internal addresses. The highest threat from this vulnerability is to confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-20239"
},
{
"category": "external",
"summary": "RHBZ#1923636",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1923636"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-20239",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20239"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20239",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20239"
}
],
"release_date": "2021-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Loading a filter is a privileged (CAP_SYS_ADMIN or root) operation. Once any filter is used, this attack is capable of being used by an unprivileged user. There is no known mitigation that product security finds suitable for this flaw.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.8,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure"
},
{
"acknowledgments": [
{
"names": [
"Or Cohen"
],
"organization": "Palo Alto Networks"
}
],
"cve": "CVE-2021-23133",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-04-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1948772"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s SCTP socket functionality that triggers a race condition. This flaw allows a local user to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Race condition in sctp_destroy_sock list_del",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having a Moderate impact because of the privileges required for running the known reproducer. The required privileges are CAP_BPF and CAP_NET_ADMIN capabilities that are disabled by default in Red Hat Enterprise Linux 7. For Red Hat Enterprise Linux 8, the SCTP protocol itself is disabled by default and cannot be used by a user without enablement by an administrator.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-23133"
},
{
"category": "external",
"summary": "RHBZ#1948772",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1948772"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23133"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23133",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23133"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b"
}
],
"release_date": "2021-04-18T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module sctp from being loaded (and this is so by default for Red Hat Enterprise Linux 8). Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Race condition in sctp_destroy_sock list_del"
},
{
"cve": "CVE-2021-28950",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2021-03-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1941762"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service in the kernel side of the FUSE functionality can allow a local system to create a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-28950"
},
{
"category": "external",
"summary": "RHBZ#1941762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941762"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-28950",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28950"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-28950",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-28950"
}
],
"release_date": "2021-03-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "As the FUSE module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install fuse /bin/true\" \u003e\u003e /etc/modprobe.d/disable-fuse.conf\n\nThe system will need to be restarted if the FUSE modules are loaded. In most circumstances, the CIFS kernel modules will be unable to be unloaded while the FUSE filesystems are in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode"
},
{
"cve": "CVE-2021-28971",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2021-03-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1941784"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. On some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: System crash in intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-28971"
},
{
"category": "external",
"summary": "RHBZ#1941784",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941784"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-28971",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28971"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-28971",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-28971"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: System crash in intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c"
},
{
"cve": "CVE-2021-29155",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2021-04-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1951595"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was discovered in retrieve_ptr_limit in kernel/bpf/verifier.c in the Linux kernel mechanism to mitigate speculatively out-of-bounds loads (Spectre mitigation). In this flaw a local, special user privileged (CAP_SYS_ADMIN) BPF program running on affected systems may bypass the protection, and execute speculatively out-of-bounds loads from the kernel memory. This can be abused to extract contents of kernel memory via side-channel.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: protection for sequences of pointer arithmetic operations against speculatively out-of-bounds loads can be bypassed to leak content of kernel memory",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29155"
},
{
"category": "external",
"summary": "RHBZ#1951595",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951595"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29155"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29155",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29155"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/04/18/4",
"url": "https://www.openwall.com/lists/oss-security/2021/04/18/4"
}
],
"release_date": "2021-04-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: protection for sequences of pointer arithmetic operations against speculatively out-of-bounds loads can be bypassed to leak content of kernel memory"
},
{
"cve": "CVE-2021-29646",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-03-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1945345"
}
],
"notes": [
{
"category": "description",
"text": "A flaw buffer overflow in the Linux kernel TIPC protocol functionality was found in the way user uses protocol with encryption enabled. A local user could use this flaw to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: improper input validation in tipc_nl_retrieve_key function in net/tipc/node.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29646"
},
{
"category": "external",
"summary": "RHBZ#1945345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945345"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29646",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29646"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29646",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29646"
}
],
"release_date": "2021-03-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: improper input validation in tipc_nl_retrieve_key function in net/tipc/node.c"
},
{
"cve": "CVE-2021-29650",
"cwe": {
"id": "CWE-662",
"name": "Improper Synchronization"
},
"discovery_date": "2021-03-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1945388"
}
],
"notes": [
{
"category": "description",
"text": "A denial-of-service (DoS) flaw was identified in the Linux kernel due to an incorrect memory barrier in xt_replace_table in net/netfilter/x_tables.c in the netfilter subsystem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29650"
},
{
"category": "external",
"summary": "RHBZ#1945388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945388"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29650",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29650"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1"
}
],
"release_date": "2021-03-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS"
},
{
"acknowledgments": [
{
"names": [
"Manfred Paul"
],
"organization": "RedRocket CTF team"
}
],
"cve": "CVE-2021-31440",
"cwe": {
"id": "CWE-682",
"name": "Incorrect Calculation"
},
"discovery_date": "2021-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1964028"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds access flaw was found in the Linux kernel\u2019s implementation of the eBPF code verifier, where an incorrect register bounds calculation while checking unsigned 32-bit instructions in an eBPF program occurs.. By default accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN. The issue results from the lack of proper validation of user-supplied eBPF programs prior to executing them. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: local escalation of privileges in handling of eBPF programs",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-31440"
},
{
"category": "external",
"summary": "RHBZ#1964028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964028"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-31440",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31440"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31440",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31440"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=10bf4e83167cc68595b85fd73bb91e8f2c086e36",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=10bf4e83167cc68595b85fd73bb91e8f2c086e36"
},
{
"category": "external",
"summary": "https://www.zerodayinitiative.com/blog/2021/5/26/cve-2021-31440-an-incorrect-bounds-calculation-in-the-linux-kernel-ebpf-verifier",
"url": "https://www.zerodayinitiative.com/blog/2021/5/26/cve-2021-31440-an-incorrect-bounds-calculation-in-the-linux-kernel-ebpf-verifier"
}
],
"release_date": "2021-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: local escalation of privileges in handling of eBPF programs"
},
{
"cve": "CVE-2021-31829",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-05-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1957788"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u0027s eBPF verification code. By default, accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN. This flaw allows a local user who can insert eBPF instructions, to use the eBPF verifier to abuse a spectre-like flaw and infer all system memory. The highest threat from this vulnerability is to confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-31829"
},
{
"category": "external",
"summary": "RHBZ#1957788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1957788"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-31829",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31829"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31829",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31829"
}
],
"release_date": "2021-04-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 and 8 kernel to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory"
},
{
"cve": "CVE-2021-31916",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-03-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1946965"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel. A bound check failure allows an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash, a leak of internal kernel information, or a privilege escalation problem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out of bounds array access in drivers/md/dm-ioctl.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated a Low impact because in the default configuration, the issue can only be triggered by a privileged local user.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-31916"
},
{
"category": "external",
"summary": "RHBZ#1946965",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946965"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-31916",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31916"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31916",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31916"
},
{
"category": "external",
"summary": "https://github.com/torvalds/linux/commit/4edbe1d7bcffcd6269f3b5eb63f710393ff2ec7a",
"url": "https://github.com/torvalds/linux/commit/4edbe1d7bcffcd6269f3b5eb63f710393ff2ec7a"
},
{
"category": "external",
"summary": "https://seclists.org/oss-sec/2021/q1/268",
"url": "https://seclists.org/oss-sec/2021/q1/268"
}
],
"release_date": "2021-03-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: out of bounds array access in drivers/md/dm-ioctl.c"
},
{
"cve": "CVE-2021-33033",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961300"
}
],
"notes": [
{
"category": "description",
"text": "A flaw use-after-free in the Linux kernel CIPSO network packet labeling protocol functionality was found in the way user open local network connection with the usage of the security labeling that is IP option number 134. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Considered to be Moderate rate, because by default CIPSO non-enabled and both no known way to reproduce the attack remotely and both it looks complex if even possible to use the attack in any way apart from crashing the system. For the usage of the inbound CIPSO connections, the administrator have to enable it with netlabelctl utility first. The vulnerability is considered to be for local user, because it can happen only when a local user opens a socket for sending packets, but not during receiving packets.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33033"
},
{
"category": "external",
"summary": "RHBZ#1961300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961300"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33033",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33033"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33033",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33033"
}
],
"release_date": "2021-03-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "The mitigation would be not allowing CIPSO labeling for the inbound network connections. For the most of the default configurations both for network routers and for the Linux servers itself it is disabled by default.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c"
},
{
"cve": "CVE-2021-33098",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-11-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2068236"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. This flaw allows an attacker who can modify the MTU of a virtualized PCIe device (in a guest, for example) to crash the host system\u2019s kernel if they set the MTU of the VF device to an unsupported value.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper input validation in the Intel(R) Ethernet ixgbe driver may allow an authenticated user to potentially enable DoS via local access",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33098"
},
{
"category": "external",
"summary": "RHBZ#2068236",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2068236"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33098",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33098"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33098",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33098"
}
],
"release_date": "2021-11-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Improper input validation in the Intel(R) Ethernet ixgbe driver may allow an authenticated user to potentially enable DoS via local access"
},
{
"cve": "CVE-2021-33200",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-05-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965458"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in kernel/bpf/verifier.c in BPF in the Linux kernel. An incorrect limit is enforced for pointer arithmetic operations which can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33200"
},
{
"category": "external",
"summary": "RHBZ#1965458",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965458"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33200",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33200"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33200",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33200"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=3d0220f6861d713213b015b582e9f21e5b28d2e0",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=3d0220f6861d713213b015b582e9f21e5b28d2e0"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=a7036191277f9fa68d92f2071ddc38c09b1e5ee5",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=a7036191277f9fa68d92f2071ddc38c09b1e5ee5"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=bb01a1bba579b4b1c5566af24d95f1767859771e",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=bb01a1bba579b4b1c5566af24d95f1767859771e"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/05/27/1",
"url": "https://www.openwall.com/lists/oss-security/2021/05/27/1"
}
],
"release_date": "2021-05-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier"
},
{
"cve": "CVE-2021-46905",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-02-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2266253"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel. This flaw occurs due to an unconditional NULL-pointer dereference on every disconnect in the Linux kernel.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: NULL-deref on disconnect regression",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-46905"
},
{
"category": "external",
"summary": "RHBZ#2266253",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266253"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-46905",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46905"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-46905",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-46905"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024022557-CVE-2021-46905-6507@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024022557-CVE-2021-46905-6507@gregkh/T"
}
],
"release_date": "2024-02-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: NULL-deref on disconnect regression"
},
{
"cve": "CVE-2021-46983",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-02-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2266906"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in an error-handling function in the Linux kernel\u0027s NVMe driver. This flaw allows an attacker with control over NVMe links to cause a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: nvmet-rdma: Fix NULL deref when SEND is completed with error",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-46983"
},
{
"category": "external",
"summary": "RHBZ#2266906",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266906"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-46983",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46983"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-46983",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-46983"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024022824-CVE-2021-46983-f808@gregkh/T/#u",
"url": "https://lore.kernel.org/linux-cve-announce/2024022824-CVE-2021-46983-f808@gregkh/T/#u"
}
],
"release_date": "2024-02-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: nvmet-rdma: Fix NULL deref when SEND is completed with error"
},
{
"cve": "CVE-2021-47080",
"cwe": {
"id": "CWE-369",
"name": "Divide By Zero"
},
"discovery_date": "2024-03-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2267533"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/core: Prevent divide-by-zero error triggered by the user\n\nThe user_entry_size is supplied by the user and later used as a\ndenominator to calculate number of entries. The zero supplied by the user\nwill trigger the following divide-by-zero error:\n\n divide error: 0000 [#1] SMP KASAN PTI\n CPU: 4 PID: 497 Comm: c_repro Not tainted 5.13.0-rc1+ #281\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\n RIP: 0010:ib_uverbs_handler_UVERBS_METHOD_QUERY_GID_TABLE+0x1b1/0x510\n Code: 87 59 03 00 00 e8 9f ab 1e ff 48 8d bd a8 00 00 00 e8 d3 70 41 ff 44 0f b7 b5 a8 00 00 00 e8 86 ab 1e ff 31 d2 4c 89 f0 31 ff \u003c49\u003e f7 f5 48 89 d6 48 89 54 24 10 48 89 04 24 e8 1b ad 1e ff 48 8b\n RSP: 0018:ffff88810416f828 EFLAGS: 00010246\n RAX: 0000000000000008 RBX: 1ffff1102082df09 RCX: ffffffff82183f3d\n RDX: 0000000000000000 RSI: ffff888105f2da00 RDI: 0000000000000000\n RBP: ffff88810416fa98 R08: 0000000000000001 R09: ffffed102082df5f\n R10: ffff88810416faf7 R11: ffffed102082df5e R12: 0000000000000000\n R13: 0000000000000000 R14: 0000000000000008 R15: ffff88810416faf0\n FS: 00007f5715efa740(0000) GS:ffff88811a700000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000000020000840 CR3: 000000010c2e0001 CR4: 0000000000370ea0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n Call Trace:\n ? ib_uverbs_handler_UVERBS_METHOD_INFO_HANDLES+0x4b0/0x4b0\n ib_uverbs_cmd_verbs+0x1546/0x1940\n ib_uverbs_ioctl+0x186/0x240\n __x64_sys_ioctl+0x38a/0x1220\n do_syscall_64+0x3f/0x80\n entry_SYSCALL_64_after_hwframe+0x44/0xae",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: RDMA/core: Prevent divide-by-zero error triggered by the user",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47080"
},
{
"category": "external",
"summary": "RHBZ#2267533",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267533"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47080",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47080"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47080",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47080"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024030142-CVE-2021-47080-eb20@gregkh/T/#u",
"url": "https://lore.kernel.org/linux-cve-announce/2024030142-CVE-2021-47080-eb20@gregkh/T/#u"
}
],
"release_date": "2024-03-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: RDMA/core: Prevent divide-by-zero error triggered by the user"
},
{
"cve": "CVE-2022-20166",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-08-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2122089"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s sysfs layer. This flaw allows a local user who can read files under the /sysfs mount point to corrupt memory or possibly crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: possible buffer overflow in sysfs reading",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-20166"
},
{
"category": "external",
"summary": "RHBZ#2122089",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122089"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-20166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20166"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-20166",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-20166"
}
],
"release_date": "2022-08-15T14:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: possible buffer overflow in sysfs reading"
}
]
}
RHSA-2021:4356
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n* kernel: out-of-bounds reads in pinctrl subsystem (CVE-2020-0427)\n* kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24502)\n* kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24503)\n* kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24504)\n* kernel: Fragmentation cache not cleared on reconnection (CVE-2020-24586)\n* kernel: Reassembling fragments encrypted under different keys (CVE-2020-24587)\n* kernel: wifi frame payload being parsed incorrectly as an L2 frame (CVE-2020-24588)\n* kernel: Forwarding EAPOL from unauthenticated wifi client (CVE-2020-26139)\n* kernel: accepting plaintext data frames in protected networks (CVE-2020-26140)\n* kernel: not verifying TKIP MIC of fragmented frames (CVE-2020-26141)\n* kernel: accepting fragmented plaintext frames in protected networks (CVE-2020-26143)\n* kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header (CVE-2020-26144)\n* kernel: accepting plaintext broadcast fragments as full frames (CVE-2020-26145)\n* kernel: powerpc: RTAS calls can be used to compromise kernel integrity (CVE-2020-27777)\n* kernel: locking inconsistency in tty_io.c and tty_jobctrl.c can lead to a read-after-free (CVE-2020-29660)\n* kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function via a long SSID value (CVE-2020-36158)\n* kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() (CVE-2020-36386)\n* kernel: Improper access control in BlueZ may allow information disclosure vulnerability. (CVE-2021-0129)\n* kernel: Use-after-free in ndb_queue_rq() in drivers/block/nbd.c (CVE-2021-3348)\n* kernel: Linux kernel eBPF RINGBUF map oversized allocation (CVE-2021-3489)\n* kernel: double free in bluetooth subsystem when the HCI device initialization fails (CVE-2021-3564)\n* kernel: use-after-free in function hci_sock_bound_ioctl() (CVE-2021-3573)\n* kernel: eBPF 32-bit source register truncation on div/mod (CVE-2021-3600)\n* kernel: DoS in rb_per_cpu_empty() (CVE-2021-3679)\n* kernel: Mounting overlayfs inside an unprivileged user namespace can reveal files (CVE-2021-3732)\n* kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt() (CVE-2021-20194)\n* kernel: Race condition in sctp_destroy_sock list_del (CVE-2021-23133)\n* kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode (CVE-2021-28950)\n* kernel: System crash in intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c (CVE-2021-28971)\n* kernel: protection can be bypassed to leak content of kernel memory (CVE-2021-29155)\n* kernel: improper input validation in tipc_nl_retrieve_key function in net/tipc/node.c (CVE-2021-29646)\n* kernel: lack a full memory barrier may lead to DoS (CVE-2021-29650)\n* kernel: local escalation of privileges in handling of eBPF programs (CVE-2021-31440)\n* kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory (CVE-2021-31829)\n* kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier (CVE-2021-33200)\n* kernel: reassembling encrypted fragments with non-consecutive packet numbers (CVE-2020-26146)\n* kernel: reassembling mixed encrypted/plaintext fragments (CVE-2020-26147)\n* kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check (CVE-2020-29368)\n* kernel: flowtable list del corruption with kernel BUG at lib/list_debug.c:50 (CVE-2021-3635)\n* kernel: NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c (CVE-2021-3659)\n* kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure (CVE-2021-20239)\n* kernel: out of bounds array access in drivers/md/dm-ioctl.c (CVE-2021-31916)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:4356",
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/"
},
{
"category": "external",
"summary": "1509204",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1509204"
},
{
"category": "external",
"summary": "1793880",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793880"
},
{
"category": "external",
"summary": "1816493",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816493"
},
{
"category": "external",
"summary": "1894101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894101"
},
{
"category": "external",
"summary": "1900844",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1900844"
},
{
"category": "external",
"summary": "1903244",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903244"
},
{
"category": "external",
"summary": "1906522",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906522"
},
{
"category": "external",
"summary": "1912683",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912683"
},
{
"category": "external",
"summary": "1913348",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913348"
},
{
"category": "external",
"summary": "1915825",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1915825"
},
{
"category": "external",
"summary": "1919893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919893"
},
{
"category": "external",
"summary": "1921958",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921958"
},
{
"category": "external",
"summary": "1923636",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1923636"
},
{
"category": "external",
"summary": "1930376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930376"
},
{
"category": "external",
"summary": "1930379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930379"
},
{
"category": "external",
"summary": "1930381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930381"
},
{
"category": "external",
"summary": "1933527",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1933527"
},
{
"category": "external",
"summary": "1939341",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1939341"
},
{
"category": "external",
"summary": "1941762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941762"
},
{
"category": "external",
"summary": "1941784",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941784"
},
{
"category": "external",
"summary": "1945345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945345"
},
{
"category": "external",
"summary": "1945388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945388"
},
{
"category": "external",
"summary": "1946965",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946965"
},
{
"category": "external",
"summary": "1948772",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1948772"
},
{
"category": "external",
"summary": "1951595",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951595"
},
{
"category": "external",
"summary": "1953847",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1953847"
},
{
"category": "external",
"summary": "1954588",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954588"
},
{
"category": "external",
"summary": "1957788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1957788"
},
{
"category": "external",
"summary": "1959559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959559"
},
{
"category": "external",
"summary": "1959642",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959642"
},
{
"category": "external",
"summary": "1959654",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959654"
},
{
"category": "external",
"summary": "1959657",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959657"
},
{
"category": "external",
"summary": "1959663",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959663"
},
{
"category": "external",
"summary": "1960490",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960490"
},
{
"category": "external",
"summary": "1960492",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960492"
},
{
"category": "external",
"summary": "1960496",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960496"
},
{
"category": "external",
"summary": "1960498",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960498"
},
{
"category": "external",
"summary": "1960500",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960500"
},
{
"category": "external",
"summary": "1960502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960502"
},
{
"category": "external",
"summary": "1960504",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960504"
},
{
"category": "external",
"summary": "1960708",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960708"
},
{
"category": "external",
"summary": "1964028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964028"
},
{
"category": "external",
"summary": "1964139",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964139"
},
{
"category": "external",
"summary": "1965038",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965038"
},
{
"category": "external",
"summary": "1965360",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965360"
},
{
"category": "external",
"summary": "1965458",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965458"
},
{
"category": "external",
"summary": "1966578",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966578"
},
{
"category": "external",
"summary": "1969489",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1969489"
},
{
"category": "external",
"summary": "1971101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971101"
},
{
"category": "external",
"summary": "1972278",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1972278"
},
{
"category": "external",
"summary": "1974627",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974627"
},
{
"category": "external",
"summary": "1975182",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975182"
},
{
"category": "external",
"summary": "1975949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975949"
},
{
"category": "external",
"summary": "1976679",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976679"
},
{
"category": "external",
"summary": "1976699",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976699"
},
{
"category": "external",
"summary": "1976946",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976946"
},
{
"category": "external",
"summary": "1976969",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976969"
},
{
"category": "external",
"summary": "1977162",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977162"
},
{
"category": "external",
"summary": "1977422",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977422"
},
{
"category": "external",
"summary": "1977537",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977537"
},
{
"category": "external",
"summary": "1977850",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977850"
},
{
"category": "external",
"summary": "1978369",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1978369"
},
{
"category": "external",
"summary": "1979070",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1979070"
},
{
"category": "external",
"summary": "1979680",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1979680"
},
{
"category": "external",
"summary": "1981954",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981954"
},
{
"category": "external",
"summary": "1986138",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986138"
},
{
"category": "external",
"summary": "1989165",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989165"
},
{
"category": "external",
"summary": "1989999",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989999"
},
{
"category": "external",
"summary": "1991976",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1991976"
},
{
"category": "external",
"summary": "1992700",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992700"
},
{
"category": "external",
"summary": "1995249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995249"
},
{
"category": "external",
"summary": "1996854",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1996854"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4356.json"
}
],
"title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2025-10-28T19:33:53+00:00",
"generator": {
"date": "2025-10-28T19:33:53+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.10"
}
},
"id": "RHSA-2021:4356",
"initial_release_date": "2021-11-09T18:06:54+00:00",
"revision_history": [
{
"date": "2021-11-09T18:06:54+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-11-09T18:06:54+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-28T19:33:53+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product": {
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-348.el8.aarch64",
"product": {
"name": "bpftool-0:4.18.0-348.el8.aarch64",
"product_id": "bpftool-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-core-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-debug-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-devel-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-headers-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-modules-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-tools-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-348.el8.aarch64",
"product": {
"name": "perf-0:4.18.0-348.el8.aarch64",
"product_id": "perf-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-348.el8.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-348.el8.aarch64",
"product_id": "python3-perf-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-348.el8.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-348.el8.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-348.el8?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-348.el8.ppc64le",
"product_id": "bpftool-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-core-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-debug-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-devel-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-headers-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-modules-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-tools-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "perf-0:4.18.0-348.el8.ppc64le",
"product_id": "perf-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-348.el8.ppc64le",
"product_id": "python3-perf-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-348.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-348.el8.x86_64",
"product": {
"name": "bpftool-0:4.18.0-348.el8.x86_64",
"product_id": "bpftool-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-core-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-debug-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-devel-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-headers-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-modules-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-tools-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-348.el8.x86_64",
"product": {
"name": "perf-0:4.18.0-348.el8.x86_64",
"product_id": "perf-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-348.el8.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-348.el8.x86_64",
"product_id": "python3-perf-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-348.el8.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-348.el8.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-348.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-348.el8.s390x",
"product": {
"name": "bpftool-0:4.18.0-348.el8.s390x",
"product_id": "bpftool-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-0:4.18.0-348.el8.s390x",
"product_id": "kernel-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-core-0:4.18.0-348.el8.s390x",
"product_id": "kernel-core-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-348.el8.s390x",
"product_id": "kernel-debug-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-348.el8.s390x",
"product_id": "kernel-debug-core-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-348.el8.s390x",
"product_id": "kernel-devel-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-348.el8.s390x",
"product_id": "kernel-headers-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-348.el8.s390x",
"product_id": "kernel-modules-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-348.el8.s390x",
"product_id": "kernel-tools-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-348.el8.s390x",
"product": {
"name": "perf-0:4.18.0-348.el8.s390x",
"product_id": "perf-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-348.el8.s390x",
"product": {
"name": "python3-perf-0:4.18.0-348.el8.s390x",
"product_id": "python3-perf-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-348.el8.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-348.el8.s390x",
"product_id": "perf-debuginfo-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-348.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-348.el8.src",
"product": {
"name": "kernel-0:4.18.0-348.el8.src",
"product_id": "kernel-0:4.18.0-348.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-348.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"product": {
"name": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"product_id": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-stablelists@4.18.0-348.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-348.el8.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-348.el8.noarch",
"product_id": "kernel-doc-0:4.18.0-348.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-348.el8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64"
},
"product_reference": "bpftool-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x"
},
"product_reference": "bpftool-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64"
},
"product_reference": "bpftool-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src"
},
"product_reference": "kernel-0:4.18.0-348.el8.src",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-core-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-348.el8.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-348.el8.noarch",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64"
},
"product_reference": "perf-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "perf-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x"
},
"product_reference": "perf-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64"
},
"product_reference": "perf-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x"
},
"product_reference": "python3-perf-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64"
},
"product_reference": "bpftool-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x"
},
"product_reference": "bpftool-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64"
},
"product_reference": "bpftool-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.el8.src as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src"
},
"product_reference": "kernel-0:4.18.0-348.el8.src",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-core-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-348.el8.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-348.el8.noarch",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64"
},
"product_reference": "perf-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "perf-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x"
},
"product_reference": "perf-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64"
},
"product_reference": "perf-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x"
},
"product_reference": "python3-perf-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-14615",
"cwe": {
"id": "CWE-212",
"name": "Improper Removal of Sensitive Information Before Storage or Transfer"
},
"discovery_date": "2020-01-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1789209"
}
],
"notes": [
{
"category": "description",
"text": "An information disclosure flaw was found in the Linux kernel. The i915 graphics driver lacks control of flow for data structures which may allow a local, authenticated user to disclose information when using ioctl commands with an attached i915 device. The highest threat from this vulnerability is to data confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Intel graphics card information leak.",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, 8 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 6, 7, and 8 may address this issue.\n\nThis has been rated as having Moderate security impact and is not currently planned to be addressed in future updates of Red Hat Enterprise MRG 2.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-14615"
},
{
"category": "external",
"summary": "RHBZ#1789209",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789209"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-14615",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14615"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14615",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14615"
}
],
"release_date": "2020-01-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Preventing loading of the i915 kernel module will prevent attackers from using this exploit against the system; however, the power management functionality of the card will be disabled and the system may draw additional power. See the kcs \u201cHow do I blacklist a kernel module to prevent it from loading automatically?\u201c (https://access.redhat.com/solutions/41278) for instructions on how to disable a kernel module from autoloading. Graphical displays may also be at low resolution or not work correctly.\n\nThis mitigation may not be suitable if the graphical login functionality is required.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Intel graphics card information leak."
},
{
"cve": "CVE-2019-15794",
"cwe": {
"id": "CWE-672",
"name": "Operation on a Resource after Expiration or Release"
},
"discovery_date": "2020-05-04T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1831055"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. In Overlayfs, vma-\u003evm_file was replaced in the mmap handlers and, on errors, the original value is not restored. A local attacker with special user privilege (or root) can cause a kernel internal information leak. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Overlayfs in the Linux kernel and shiftfs not restoring original value on error leading to a refcount underflow",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-15794"
},
{
"category": "external",
"summary": "RHBZ#1831055",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831055"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-15794",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15794"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15794",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15794"
}
],
"release_date": "2019-11-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Overlayfs in the Linux kernel and shiftfs not restoring original value on error leading to a refcount underflow"
},
{
"cve": "CVE-2020-0427",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-01-24T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1919893"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux pinctrl system. It is possible to trigger an of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds reads in pinctrl subsystem.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-0427"
},
{
"category": "external",
"summary": "RHBZ#1919893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919893"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-0427",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0427"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0427",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0427"
}
],
"release_date": "2020-11-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: out-of-bounds reads in pinctrl subsystem."
},
{
"cve": "CVE-2020-24502",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-02-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1930379"
}
],
"notes": [
{
"category": "description",
"text": "Improper input validation in some Intel(R) Ethernet E810 Adapter drivers for Linux may allow an authenticated user to potentially enable a denial of service via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24502"
},
{
"category": "external",
"summary": "RHBZ#1930379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930379"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24502",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24502"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24502",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24502"
}
],
"release_date": "2021-02-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers"
},
{
"cve": "CVE-2020-24503",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-02-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1930381"
}
],
"notes": [
{
"category": "description",
"text": "Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers for Linux may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24503"
},
{
"category": "external",
"summary": "RHBZ#1930381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930381"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24503",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24503"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24503",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24503"
}
],
"release_date": "2021-02-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers"
},
{
"cve": "CVE-2020-24504",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-02-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1930376"
}
],
"notes": [
{
"category": "description",
"text": "An uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers for Linux may allow an authenticated user to potentially cause a denial of service via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24504"
},
{
"category": "external",
"summary": "RHBZ#1930376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930376"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24504",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24504"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24504",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24504"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html"
}
],
"release_date": "2021-02-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers"
},
{
"cve": "CVE-2020-24586",
"cwe": {
"id": "CWE-212",
"name": "Improper Removal of Sensitive Information Before Storage or Transfer"
},
"discovery_date": "2021-05-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1959642"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernels implementation of wifi fragmentation handling. An attacker with the ability to transmit within the wireless transmission range of an access point can abuse a flaw where previous contents of wifi fragments can be unintentionally transmitted to another device.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Fragmentation cache not cleared on reconnection",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "RHBZ#1959642",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959642"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24586"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/"
}
],
"release_date": "2021-05-12T01:20:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Fragmentation cache not cleared on reconnection"
},
{
"cve": "CVE-2020-24587",
"cwe": {
"id": "CWE-345",
"name": "Insufficient Verification of Data Authenticity"
},
"discovery_date": "2021-05-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1959654"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u0027s WiFi implementation. An attacker within the wireless range can abuse a logic flaw in the WiFi implementation by reassembling packets from multiple fragments under different keys, treating them as valid. This flaw allows an attacker to send a fragment under an incorrect key, treating them as a valid fragment under the new key. The highest threat from this vulnerability is to confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Reassembling fragments encrypted under different keys",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "RHBZ#1959654",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959654"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24587",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24587"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24587",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24587"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/"
}
],
"release_date": "2021-05-11T14:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.1,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Reassembling fragments encrypted under different keys"
},
{
"cve": "CVE-2020-24588",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-05-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1959657"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernels wifi implementation. An attacker within wireless broadcast range can inject custom data into the wireless communication circumventing checks on the data. This can cause the frame to pass checks and be considered a valid frame of a different type.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: wifi frame payload being parsed incorrectly as an L2 frame",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "RHBZ#1959657",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959657"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24588",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24588"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24588",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24588"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.25d93176ddaf.I9e265b597f2cd23eb44573f35b625947b386a9de@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.25d93176ddaf.I9e265b597f2cd23eb44573f35b625947b386a9de@changeid/"
}
],
"release_date": "2021-05-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: wifi frame payload being parsed incorrectly as an L2 frame"
},
{
"cve": "CVE-2020-26139",
"cwe": {
"id": "CWE-829",
"name": "Inclusion of Functionality from Untrusted Control Sphere"
},
"discovery_date": "2021-05-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1959663"
}
],
"notes": [
{
"category": "description",
"text": "Frames used for authentication and key management between the AP and connected clients. Some clients may take these redirected frames masquerading as control mechanisms from the AP.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Forwarding EAPOL from unauthenticated wifi client",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26139"
},
{
"category": "external",
"summary": "RHBZ#1959663",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959663"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26139"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26139",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26139"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.cb327ed0cabe.Ib7dcffa2a31f0913d660de65ba3c8aca75b1d10f@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.cb327ed0cabe.Ib7dcffa2a31f0913d660de65ba3c8aca75b1d10f@changeid/"
}
],
"release_date": "2021-05-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Forwarding EAPOL from unauthenticated wifi client"
},
{
"cve": "CVE-2020-26140",
"cwe": {
"id": "CWE-346",
"name": "Origin Validation Error"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960490"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Linux kernel. Where the WiFi implementations accept plaintext frames in a protected WiFi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: accepting plaintext data frames in protected networks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26140"
},
{
"category": "external",
"summary": "RHBZ#1960490",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960490"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26140",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26140"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26140",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26140"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: accepting plaintext data frames in protected networks"
},
{
"cve": "CVE-2020-26141",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960492"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Linux kernel\u0027s WiFi implementation. An attacker within wireless range can inject a control packet fragment where the kernel does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: not verifying TKIP MIC of fragmented frames",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "RHBZ#1960492",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960492"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26141"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26141",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26141"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.c3f1d42c6746.I795593fcaae941c471425b8c7d5f7bb185d29142@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.c3f1d42c6746.I795593fcaae941c471425b8c7d5f7bb185d29142@changeid/"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: not verifying TKIP MIC of fragmented frames"
},
{
"cve": "CVE-2020-26143",
"cwe": {
"id": "CWE-346",
"name": "Origin Validation Error"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960496"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Linux kernel, where the WiFi implementations assemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: accepting fragmented plaintext frames in protected networks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26143"
},
{
"category": "external",
"summary": "RHBZ#1960496",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960496"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26143",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26143"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26143",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26143"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: accepting fragmented plaintext frames in protected networks"
},
{
"cve": "CVE-2020-26144",
"cwe": {
"id": "CWE-290",
"name": "Authentication Bypass by Spoofing"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960498"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel, where the WiFi implementations accept plaintext A-MSDU frames as long as the first 8 bytes correspond to a valid RFC1042 (ex., LLC/SNAP) header for EAPOL. The highest threat from this vulnerability is to integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26144"
},
{
"category": "external",
"summary": "RHBZ#1960498",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960498"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26144",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26144"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26144",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26144"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header"
},
{
"cve": "CVE-2020-26145",
"cwe": {
"id": "CWE-307",
"name": "Improper Restriction of Excessive Authentication Attempts"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960500"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in ath10k_htt_rx_proc_rx_frag_ind_hl in drivers/net/wireless/ath/ath10k/htt_rx.c in the Linux kernel WiFi implementations, where it accepts a second (or subsequent) broadcast fragments even when sent in plaintext and then process them as full unfragmented frames. The highest threat from this vulnerability is to integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: accepting plaintext broadcast fragments as full frames",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26145"
},
{
"category": "external",
"summary": "RHBZ#1960500",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960500"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26145"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26145",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26145"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.9ca6ca7945a9.I1e18b514590af17c155bda86699bc3a971a8dcf4@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.9ca6ca7945a9.I1e18b514590af17c155bda86699bc3a971a8dcf4@changeid/"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: accepting plaintext broadcast fragments as full frames"
},
{
"cve": "CVE-2020-26146",
"cwe": {
"id": "CWE-307",
"name": "Improper Restriction of Excessive Authentication Attempts"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960502"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Linux kernel, where the WiFi implementation reassemble fragments with non-consecutive packet numbers. An adversary can abuse this to exfiltrate selected fragments. This vulnerability is exploitable when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used. Note that WEP is vulnerable to this attack by design.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: reassembling encrypted fragments with non-consecutive packet numbers",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26146"
},
{
"category": "external",
"summary": "RHBZ#1960502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960502"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26146"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26146",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26146"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: reassembling encrypted fragments with non-consecutive packet numbers"
},
{
"cve": "CVE-2020-26147",
"cwe": {
"id": "CWE-307",
"name": "Improper Restriction of Excessive Authentication Attempts"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960504"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in ieee80211_rx_h_defragment in net/mac80211/rx.c in the Linux Kernel\u0027s WiFi implementation. This vulnerability can be abused to inject packets or exfiltrate selected fragments when another device sends fragmented frames, and the WEP, CCMP, or GCMP data-confidentiality protocol is used. The highest threat from this vulnerability is to integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: reassembling mixed encrypted/plaintext fragments",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26147"
},
{
"category": "external",
"summary": "RHBZ#1960504",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960504"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26147",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26147"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.30c4394bb835.I5acfdb552cc1d20c339c262315950b3eac491397@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.30c4394bb835.I5acfdb552cc1d20c339c262315950b3eac491397@changeid/"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: reassembling mixed encrypted/plaintext fragments"
},
{
"acknowledgments": [
{
"names": [
"Daniel Axtens"
],
"organization": "IBM"
}
],
"cve": "CVE-2020-27777",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"discovery_date": "2020-10-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1900844"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: powerpc: RTAS calls can be used to compromise kernel integrity",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having Moderate impact due to the required privileges and hardware dependencies.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-27777"
},
{
"category": "external",
"summary": "RHBZ#1900844",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1900844"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-27777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27777"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27777",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27777"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?h=next\u0026id=bd59380c5ba4147dcbaad3e582b55ccfd120b764",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?h=next\u0026id=bd59380c5ba4147dcbaad3e582b55ccfd120b764"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2020/10/09/1",
"url": "https://www.openwall.com/lists/oss-security/2020/10/09/1"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2020/11/23/2",
"url": "https://www.openwall.com/lists/oss-security/2020/11/23/2"
}
],
"release_date": "2020-10-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: powerpc: RTAS calls can be used to compromise kernel integrity"
},
{
"cve": "CVE-2020-29368",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-12-01T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903244"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw has been rated as having Moderateimpact because, based on Red Hat\u0027s assessment, this issue is hard to exploit in practice because the race window is too small for it to be reliable.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-29368"
},
{
"category": "external",
"summary": "RHBZ#1903244",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903244"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-29368",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29368"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29368",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29368"
}
],
"release_date": "2020-06-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check"
},
{
"cve": "CVE-2020-29660",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2020-12-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1906522"
}
],
"notes": [
{
"category": "description",
"text": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel. A local user could use this flaw to read numerical value from memory after free.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: locking inconsistency in drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c can lead to a read-after-free",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having Low impact (Red Hat Enterprise Linux 7) because of the need to have CAP_SYS_TTY_CONFIG privileges.\n\nThis flaw is rated as having Moderate (Red Hat Enterprise Linux 8) impact because of the need to have CAP_SYS_TTY_CONFIG privileges. Red Hat Enterprise Linux 8 enabled unprivileged user/network namespaces by default which can be used to exercise this vulnerability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-29660"
},
{
"category": "external",
"summary": "RHBZ#1906522",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906522"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-29660",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29660"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29660",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29660"
}
],
"release_date": "2020-12-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: locking inconsistency in drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c can lead to a read-after-free"
},
{
"cve": "CVE-2020-36158",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2021-01-05T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1913348"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. The marvell wifi driver could allow a local attacker to execute arbitrary code via a long SSID value in mwifiex_cmd_802_11_ad_hoc_start function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function in drivers/net/wireless/marvell/mwifiex/join.c via a long SSID value",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having Moderate impact because the attacker needs to be local and privileged enough to be able to initiate ad-hoc WIFI network creation.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36158"
},
{
"category": "external",
"summary": "RHBZ#1913348",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913348"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36158",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36158"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36158",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36158"
}
],
"release_date": "2020-12-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module mwifiex from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function in drivers/net/wireless/marvell/mwifiex/join.c via a long SSID value"
},
{
"cve": "CVE-2020-36312",
"cwe": {
"id": "CWE-772",
"name": "Missing Release of Resource after Effective Lifetime"
},
"discovery_date": "2021-04-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1947991"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the KVM hypervisor of the Linux kernel. A memory leak could occur in kvm_io_bus_unregister_dev() upon a kmalloc failure. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: memory leak upon a kmalloc failure in kvm_io_bus_unregister_dev function in virt/kvm/kvm_main.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36312"
},
{
"category": "external",
"summary": "RHBZ#1947991",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1947991"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36312",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36312"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36312",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36312"
}
],
"release_date": "2020-09-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: memory leak upon a kmalloc failure in kvm_io_bus_unregister_dev function in virt/kvm/kvm_main.c"
},
{
"cve": "CVE-2020-36386",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2021-06-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1969489"
}
],
"notes": [
{
"category": "description",
"text": "A flaw out of bounds memory access in the Linux kernel bluetooth subsystem was found in the way when some data being read about the bluetooth device with the hci_extended_inquiry_result_evt call. A local user could use this flaw to crash the system or read some data out of memory bounds that can lead to data confidentiality threat.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() in net/bluetooth/hci_event.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having a Moderate impact because even the data being read out of memory bounds is written to some cache, it was known before that this data from non-safe source and as result no any sensitive dependencies on this data.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36386"
},
{
"category": "external",
"summary": "RHBZ#1969489",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1969489"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36386",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36386"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36386",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36386"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51c19bf3d5cfaa66571e4b88ba2a6f6295311101",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51c19bf3d5cfaa66571e4b88ba2a6f6295311101"
}
],
"release_date": "2020-07-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module bluetooth from being loaded (if Bluetooth not required for the system). Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() in net/bluetooth/hci_event.c"
},
{
"cve": "CVE-2021-0129",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965038"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access. The highest threat from this vulnerability is to data confidentiality and integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper access control in BlueZ may allow information disclosure vulnerability.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0129"
},
{
"category": "external",
"summary": "RHBZ#1965038",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965038"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0129"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0129",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0129"
}
],
"release_date": "2021-06-08T03:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Improper access control in BlueZ may allow information disclosure vulnerability."
},
{
"cve": "CVE-2021-3348",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-01-28T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1921958"
}
],
"notes": [
{
"category": "description",
"text": "A use after free flaw in the Linux kernel network block device (NBD) subsystem was found in the way user calls an ioctl NBD_SET_SOCK at a certain point during device setup.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use-after-free in ndb_queue_rq() in drivers/block/nbd.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having a Moderate impact because in the default configuration, the issue can only be triggered by a privileged local user (with access to the nbd device).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3348"
},
{
"category": "external",
"summary": "RHBZ#1921958",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921958"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3348",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3348"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3348",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3348"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-block/24dff677353e2e30a71d8b66c4dffdbdf77c4dbd.1611595239.git.josef@toxicpanda.com/",
"url": "https://lore.kernel.org/linux-block/24dff677353e2e30a71d8b66c4dffdbdf77c4dbd.1611595239.git.josef@toxicpanda.com/"
}
],
"release_date": "2021-01-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module nbd from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Use-after-free in ndb_queue_rq() in drivers/block/nbd.c"
},
{
"cve": "CVE-2021-3444",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-03-23T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1942667"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds access flaw was found in the Linux kernel\u0027s implementation of the eBPF code verifier in the way a user running the eBPF script uses mod32 destination register truncation when the source register was known to be 0. This flaw allows a local user to crash the system or possibly escalate their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: bpf verifier incorrect mod32 truncation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having Moderate impact because of the need to have elevated privileges or non-standard configuration for running BPF script.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3444"
},
{
"category": "external",
"summary": "RHBZ#1942667",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1942667"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3444",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3444"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3444",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3444"
}
],
"release_date": "2021-02-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: bpf verifier incorrect mod32 truncation"
},
{
"acknowledgments": [
{
"names": [
"Ryota Shiga"
]
}
],
"cve": "CVE-2021-3489",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1959559"
}
],
"notes": [
{
"category": "description",
"text": "A flaw out of bound memory write in the Linux kernel BPF subsystem was found in the way user writes to BPF ring buffer too fast, so larger buffer than available memory could be allocated. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Linux kernel eBPF RINGBUF map oversized allocation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3489"
},
{
"category": "external",
"summary": "RHBZ#1959559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959559"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3489",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3489"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3489",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3489"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=4b81ccebaeee885ab1aa1438133f2991e3a2b6ea",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=4b81ccebaeee885ab1aa1438133f2991e3a2b6ea"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/05/11/10",
"url": "https://www.openwall.com/lists/oss-security/2021/05/11/10"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Linux kernel eBPF RINGBUF map oversized allocation"
},
{
"acknowledgments": [
{
"names": [
"HaoXiong, LinMa"
],
"organization": "ckSec"
}
],
"cve": "CVE-2021-3564",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"discovery_date": "2021-05-19T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1964139"
}
],
"notes": [
{
"category": "description",
"text": "A flaw double-free memory corruption in the Linux kernel HCI device initialization subsystem was found in the way user attach malicious HCI TTY Bluetooth device. A local user could use this flaw to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: double free in bluetooth subsystem when the HCI device initialization fails",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The impact is Moderate, because the double free happens during flush procedure, and no use of incorrect data during flush finishing even if double free could happen without kernel crash.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3564"
},
{
"category": "external",
"summary": "RHBZ#1964139",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964139"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3564"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3564",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3564"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/05/25/1",
"url": "https://www.openwall.com/lists/oss-security/2021/05/25/1"
}
],
"release_date": "2021-05-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: double free in bluetooth subsystem when the HCI device initialization fails"
},
{
"cve": "CVE-2021-3573",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-31T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1966578"
}
],
"notes": [
{
"category": "description",
"text": "A flaw use-after-free in function hci_sock_bound_ioctl() of the Linux kernel HCI subsystem was found in the way user calls ioct HCIUNBLOCKADDR or other way triggers race condition of the call hci_unregister_dev() together with one of the calls hci_sock_blacklist_add(), hci_sock_blacklist_del(), hci_get_conn_info(), hci_get_auth_info(). A privileged local user could use this flaw to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in function hci_sock_bound_ioctl()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having a Moderate impact because of the privileges (CAP_NET_ADMIN in initial namespace) required for exploiting the issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3573"
},
{
"category": "external",
"summary": "RHBZ#1966578",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966578"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3573",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3573"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth.git/commit/?id=e305509e678b3a4af2b3cfd410f409f7cdaabb52",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth.git/commit/?id=e305509e678b3a4af2b3cfd410f409f7cdaabb52"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/06/08/2",
"url": "https://www.openwall.com/lists/oss-security/2021/06/08/2"
}
],
"release_date": "2021-06-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising easThe required privileges is CAP_NET_ADMIN capabilities. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.e of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in function hci_sock_bound_ioctl()"
},
{
"cve": "CVE-2021-3600",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-23T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1981954"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s eBPF verification code, where the eBPF 32-bit div/mod source register truncation could lead to out-of-bounds reads and writes. By default, accessing the eBPF verifier is only possible to privileged users with CAP_SYS_ADMIN. This flaw allows a local user who can run eBPF instructions to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: eBPF 32-bit source register truncation on div/mod",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3600"
},
{
"category": "external",
"summary": "RHBZ#1981954",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981954"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3600"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3600",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3600"
},
{
"category": "external",
"summary": "https://lore.kernel.org/patchwork/patch/1379497/",
"url": "https://lore.kernel.org/patchwork/patch/1379497/"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/06/23/1",
"url": "https://www.openwall.com/lists/oss-security/2021/06/23/1"
}
],
"release_date": "2021-06-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: eBPF 32-bit source register truncation on div/mod"
},
{
"cve": "CVE-2021-3635",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-06-22T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1976946"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel netfilter implementation. A user with root (CAP_SYS_ADMIN) access is able to panic the system when issuing netfilter netflow commands",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: flowtable list del corruption with kernel BUG at lib/list_debug.c:50",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3635"
},
{
"category": "external",
"summary": "RHBZ#1976946",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976946"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3635",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3635"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3635",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3635"
}
],
"release_date": "2021-08-06T04:47:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: flowtable list del corruption with kernel BUG at lib/list_debug.c:50"
},
{
"cve": "CVE-2021-3659",
"cwe": {
"id": "CWE-252",
"name": "Unchecked Return Value"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1975949"
}
],
"notes": [
{
"category": "description",
"text": "A NULL pointer dereference flaw was found in the Linux kernel\u2019s IEEE 802.15.4 wireless networking subsystem in the way the user closes the LR-WPAN connection. This flaw allows a local user to crash the system. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3659"
},
{
"category": "external",
"summary": "RHBZ#1975949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975949"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3659",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3659"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3659",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3659"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8"
}
],
"release_date": "2021-04-06T19:22:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module mac802154 from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c"
},
{
"acknowledgments": [
{
"names": [
"Haoran Luo"
],
"organization": "Chaitin Tech"
}
],
"cve": "CVE-2021-3679",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-07-25T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1989165"
}
],
"notes": [
{
"category": "description",
"text": "A lack of CPU resources in the Linux kernel tracing module functionality was found in the way users use the trace ring buffer in specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: DoS in rb_per_cpu_empty()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3679"
},
{
"category": "external",
"summary": "RHBZ#1989165",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989165"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3679",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3679"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3679",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3679"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20210723125527.767d1c18@oasis.local.home/",
"url": "https://lore.kernel.org/lkml/20210723125527.767d1c18@oasis.local.home/"
}
],
"release_date": "2021-07-20T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: DoS in rb_per_cpu_empty()"
},
{
"acknowledgments": [
{
"names": [
"Miklos Szeredi"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2021-3732",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-08-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1995249"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s OverlayFS subsystem in the way the user mounts the TmpFS filesystem with OverlayFS. This flaw allows a local user to gain access to hidden files that should not be accessible.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: overlayfs: Mounting overlayfs inside an unprivileged user namespace can reveal files",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3732"
},
{
"category": "external",
"summary": "RHBZ#1995249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995249"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3732",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3732"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3732",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3732"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=427215d85e8d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=427215d85e8d"
}
],
"release_date": "2021-08-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: overlayfs: Mounting overlayfs inside an unprivileged user namespace can reveal files"
},
{
"cve": "CVE-2021-4442",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-08-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2308455"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: add sanity tests to TCP_QUEUE_SEQ\n\nQingyu Li reported a syzkaller bug where the repro\nchanges RCV SEQ _after_ restoring data in the receive queue.\n\nmprotect(0x4aa000, 12288, PROT_READ) = 0\nmmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000\nmmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000\nmmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000\nsocket(AF_INET6, SOCK_STREAM, IPPROTO_IP) = 3\nsetsockopt(3, SOL_TCP, TCP_REPAIR, [1], 4) = 0\nconnect(3, {sa_family=AF_INET6, sin6_port=htons(0), sin6_flowinfo=htonl(0), inet_pton(AF_INET6, \"::1\", \u0026sin6_addr), sin6_scope_id=0}, 28) = 0\nsetsockopt(3, SOL_TCP, TCP_REPAIR_QUEUE, [1], 4) = 0\nsendmsg(3, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base=\"0x0000000000000003\\0\\0\", iov_len=20}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, 0) = 20\nsetsockopt(3, SOL_TCP, TCP_REPAIR, [0], 4) = 0\nsetsockopt(3, SOL_TCP, TCP_QUEUE_SEQ, [128], 4) = 0\nrecvfrom(3, NULL, 20, 0, NULL, NULL) = -1 ECONNRESET (Connection reset by peer)\n\nsyslog shows:\n[ 111.205099] TCP recvmsg seq # bug 2: copied 80, seq 0, rcvnxt 80, fl 0\n[ 111.207894] WARNING: CPU: 1 PID: 356 at net/ipv4/tcp.c:2343 tcp_recvmsg_locked+0x90e/0x29a0\n\nThis should not be allowed. TCP_QUEUE_SEQ should only be used\nwhen queues are empty.\n\nThis patch fixes this case, and the tx path as well.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: add sanity tests to TCP_QUEUE_SEQ",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is fixed in RHEL-8.5 and above\n~~~\nin (rhel-8.5, rhel-8.6, rhel-8.7, rhel-8.8, rhel-8.9, rhel-8.10) tcp: add sanity tests to TCP_QUEUE_SEQ\n~~~",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4442"
},
{
"category": "external",
"summary": "RHBZ#2308455",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2308455"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4442",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4442"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4442",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4442"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024082945-CVE-2021-4442-0a5f@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024082945-CVE-2021-4442-0a5f@gregkh/T"
}
],
"release_date": "2024-08-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: add sanity tests to TCP_QUEUE_SEQ"
},
{
"acknowledgments": [
{
"names": [
"Loris Reiff"
]
}
],
"cve": "CVE-2021-20194",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2020-12-30T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1912683"
}
],
"notes": [
{
"category": "description",
"text": "A flaw buffer overflow in the Linux kernel BPF subsystem was found in the way user running BPF script calling getsockopt. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having Moderate impact because of the need to have elevated privileges or non-standard configuration for running BPF script.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-20194"
},
{
"category": "external",
"summary": "RHBZ#1912683",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912683"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-20194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20194"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20194",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20194"
}
],
"release_date": "2021-01-22T10:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\n\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt()"
},
{
"cve": "CVE-2021-20239",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-02-01T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1923636"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the BPF protocol. This flaw allows an attacker with a local account to leak information about kernel internal addresses. The highest threat from this vulnerability is to confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-20239"
},
{
"category": "external",
"summary": "RHBZ#1923636",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1923636"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-20239",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20239"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20239",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20239"
}
],
"release_date": "2021-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Loading a filter is a privileged (CAP_SYS_ADMIN or root) operation. Once any filter is used, this attack is capable of being used by an unprivileged user. There is no known mitigation that product security finds suitable for this flaw.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.8,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure"
},
{
"acknowledgments": [
{
"names": [
"Or Cohen"
],
"organization": "Palo Alto Networks"
}
],
"cve": "CVE-2021-23133",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-04-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1948772"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s SCTP socket functionality that triggers a race condition. This flaw allows a local user to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Race condition in sctp_destroy_sock list_del",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having a Moderate impact because of the privileges required for running the known reproducer. The required privileges are CAP_BPF and CAP_NET_ADMIN capabilities that are disabled by default in Red Hat Enterprise Linux 7. For Red Hat Enterprise Linux 8, the SCTP protocol itself is disabled by default and cannot be used by a user without enablement by an administrator.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-23133"
},
{
"category": "external",
"summary": "RHBZ#1948772",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1948772"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23133"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23133",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23133"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b"
}
],
"release_date": "2021-04-18T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module sctp from being loaded (and this is so by default for Red Hat Enterprise Linux 8). Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Race condition in sctp_destroy_sock list_del"
},
{
"cve": "CVE-2021-28950",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2021-03-22T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1941762"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service in the kernel side of the FUSE functionality can allow a local system to create a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-28950"
},
{
"category": "external",
"summary": "RHBZ#1941762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941762"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-28950",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28950"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-28950",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-28950"
}
],
"release_date": "2021-03-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "As the FUSE module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install fuse /bin/true\" \u003e\u003e /etc/modprobe.d/disable-fuse.conf\n\nThe system will need to be restarted if the FUSE modules are loaded. In most circumstances, the CIFS kernel modules will be unable to be unloaded while the FUSE filesystems are in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode"
},
{
"cve": "CVE-2021-28971",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2021-03-22T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1941784"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. On some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: System crash in intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-28971"
},
{
"category": "external",
"summary": "RHBZ#1941784",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941784"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-28971",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28971"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-28971",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-28971"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: System crash in intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c"
},
{
"cve": "CVE-2021-29155",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2021-04-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1951595"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was discovered in retrieve_ptr_limit in kernel/bpf/verifier.c in the Linux kernel mechanism to mitigate speculatively out-of-bounds loads (Spectre mitigation). In this flaw a local, special user privileged (CAP_SYS_ADMIN) BPF program running on affected systems may bypass the protection, and execute speculatively out-of-bounds loads from the kernel memory. This can be abused to extract contents of kernel memory via side-channel.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: protection for sequences of pointer arithmetic operations against speculatively out-of-bounds loads can be bypassed to leak content of kernel memory",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29155"
},
{
"category": "external",
"summary": "RHBZ#1951595",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951595"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29155"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29155",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29155"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/04/18/4",
"url": "https://www.openwall.com/lists/oss-security/2021/04/18/4"
}
],
"release_date": "2021-04-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: protection for sequences of pointer arithmetic operations against speculatively out-of-bounds loads can be bypassed to leak content of kernel memory"
},
{
"cve": "CVE-2021-29646",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-03-30T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1945345"
}
],
"notes": [
{
"category": "description",
"text": "A flaw buffer overflow in the Linux kernel TIPC protocol functionality was found in the way user uses protocol with encryption enabled. A local user could use this flaw to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: improper input validation in tipc_nl_retrieve_key function in net/tipc/node.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29646"
},
{
"category": "external",
"summary": "RHBZ#1945345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945345"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29646",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29646"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29646",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29646"
}
],
"release_date": "2021-03-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: improper input validation in tipc_nl_retrieve_key function in net/tipc/node.c"
},
{
"cve": "CVE-2021-29650",
"cwe": {
"id": "CWE-662",
"name": "Improper Synchronization"
},
"discovery_date": "2021-03-30T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1945388"
}
],
"notes": [
{
"category": "description",
"text": "A denial-of-service (DoS) flaw was identified in the Linux kernel due to an incorrect memory barrier in xt_replace_table in net/netfilter/x_tables.c in the netfilter subsystem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29650"
},
{
"category": "external",
"summary": "RHBZ#1945388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945388"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29650",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29650"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1"
}
],
"release_date": "2021-03-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS"
},
{
"cve": "CVE-2021-29657",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"discovery_date": "2021-08-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1995153"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. A KVM guest on AMD can launch a nested guest without the Intercept VMRUN control bit by exploiting a TOCTOU vulnerability in nested_svm_vmrun. A malicious guest could use this flaw to gain unrestricted access to host MSRs, possibly leading to guest-to-host escape scenario.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: KVM: double fetch in nested_svm_vmrun can lead to unrestricted MSR access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The nested virtualization feature is not enabled by default up to Red Hat Enterprise Linux 8.4. Most importantly, Red Hat currently provides nested virtualization only as a Technology Preview, and is therefore unsupported for production use. For additional details please see https://access.redhat.com/solutions/21101 and https://access.redhat.com/support/offerings/techpreview.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29657"
},
{
"category": "external",
"summary": "RHBZ#1995153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995153"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29657",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29657"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29657",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29657"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2177",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2177"
}
],
"release_date": "2021-03-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "This vulnerability can be mitigated by disabling the nested virtualization feature:\n```\n# modprobe -r kvm_amd\n# modprobe kvm_amd nested=0\n```",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: KVM: double fetch in nested_svm_vmrun can lead to unrestricted MSR access"
},
{
"acknowledgments": [
{
"names": [
"Manfred Paul"
],
"organization": "RedRocket CTF team"
}
],
"cve": "CVE-2021-31440",
"cwe": {
"id": "CWE-682",
"name": "Incorrect Calculation"
},
"discovery_date": "2021-05-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1964028"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds access flaw was found in the Linux kernel\u2019s implementation of the eBPF code verifier, where an incorrect register bounds calculation while checking unsigned 32-bit instructions in an eBPF program occurs.. By default accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN. The issue results from the lack of proper validation of user-supplied eBPF programs prior to executing them. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: local escalation of privileges in handling of eBPF programs",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-31440"
},
{
"category": "external",
"summary": "RHBZ#1964028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964028"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-31440",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31440"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31440",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31440"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=10bf4e83167cc68595b85fd73bb91e8f2c086e36",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=10bf4e83167cc68595b85fd73bb91e8f2c086e36"
},
{
"category": "external",
"summary": "https://www.zerodayinitiative.com/blog/2021/5/26/cve-2021-31440-an-incorrect-bounds-calculation-in-the-linux-kernel-ebpf-verifier",
"url": "https://www.zerodayinitiative.com/blog/2021/5/26/cve-2021-31440-an-incorrect-bounds-calculation-in-the-linux-kernel-ebpf-verifier"
}
],
"release_date": "2021-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: local escalation of privileges in handling of eBPF programs"
},
{
"cve": "CVE-2021-31829",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-05-04T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1957788"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u0027s eBPF verification code. By default, accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN. This flaw allows a local user who can insert eBPF instructions, to use the eBPF verifier to abuse a spectre-like flaw and infer all system memory. The highest threat from this vulnerability is to confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-31829"
},
{
"category": "external",
"summary": "RHBZ#1957788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1957788"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-31829",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31829"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31829",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31829"
}
],
"release_date": "2021-04-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 and 8 kernel to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory"
},
{
"cve": "CVE-2021-31916",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-03-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1946965"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel. A bound check failure allows an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash, a leak of internal kernel information, or a privilege escalation problem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out of bounds array access in drivers/md/dm-ioctl.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated a Low impact because in the default configuration, the issue can only be triggered by a privileged local user.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-31916"
},
{
"category": "external",
"summary": "RHBZ#1946965",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946965"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-31916",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31916"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31916",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31916"
},
{
"category": "external",
"summary": "https://github.com/torvalds/linux/commit/4edbe1d7bcffcd6269f3b5eb63f710393ff2ec7a",
"url": "https://github.com/torvalds/linux/commit/4edbe1d7bcffcd6269f3b5eb63f710393ff2ec7a"
},
{
"category": "external",
"summary": "https://seclists.org/oss-sec/2021/q1/268",
"url": "https://seclists.org/oss-sec/2021/q1/268"
}
],
"release_date": "2021-03-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: out of bounds array access in drivers/md/dm-ioctl.c"
},
{
"cve": "CVE-2021-33033",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961300"
}
],
"notes": [
{
"category": "description",
"text": "A flaw use-after-free in the Linux kernel CIPSO network packet labeling protocol functionality was found in the way user open local network connection with the usage of the security labeling that is IP option number 134. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Considered to be Moderate rate, because by default CIPSO non-enabled and both no known way to reproduce the attack remotely and both it looks complex if even possible to use the attack in any way apart from crashing the system. For the usage of the inbound CIPSO connections, the administrator have to enable it with netlabelctl utility first. The vulnerability is considered to be for local user, because it can happen only when a local user opens a socket for sending packets, but not during receiving packets.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33033"
},
{
"category": "external",
"summary": "RHBZ#1961300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961300"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33033",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33033"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33033",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33033"
}
],
"release_date": "2021-03-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "The mitigation would be not allowing CIPSO labeling for the inbound network connections. For the most of the default configurations both for network routers and for the Linux servers itself it is disabled by default.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c"
},
{
"cve": "CVE-2021-33098",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-11-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2068236"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. This flaw allows an attacker who can modify the MTU of a virtualized PCIe device (in a guest, for example) to crash the host system\u2019s kernel if they set the MTU of the VF device to an unsupported value.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper input validation in the Intel(R) Ethernet ixgbe driver may allow an authenticated user to potentially enable DoS via local access",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33098"
},
{
"category": "external",
"summary": "RHBZ#2068236",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2068236"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33098",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33098"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33098",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33098"
}
],
"release_date": "2021-11-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Improper input validation in the Intel(R) Ethernet ixgbe driver may allow an authenticated user to potentially enable DoS via local access"
},
{
"cve": "CVE-2021-33200",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-05-27T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965458"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in kernel/bpf/verifier.c in BPF in the Linux kernel. An incorrect limit is enforced for pointer arithmetic operations which can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33200"
},
{
"category": "external",
"summary": "RHBZ#1965458",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965458"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33200",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33200"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33200",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33200"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=3d0220f6861d713213b015b582e9f21e5b28d2e0",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=3d0220f6861d713213b015b582e9f21e5b28d2e0"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=a7036191277f9fa68d92f2071ddc38c09b1e5ee5",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=a7036191277f9fa68d92f2071ddc38c09b1e5ee5"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=bb01a1bba579b4b1c5566af24d95f1767859771e",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=bb01a1bba579b4b1c5566af24d95f1767859771e"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/05/27/1",
"url": "https://www.openwall.com/lists/oss-security/2021/05/27/1"
}
],
"release_date": "2021-05-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier"
},
{
"cve": "CVE-2021-46905",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-02-27T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2266253"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel. This flaw occurs due to an unconditional NULL-pointer dereference on every disconnect in the Linux kernel.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: NULL-deref on disconnect regression",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-46905"
},
{
"category": "external",
"summary": "RHBZ#2266253",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266253"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-46905",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46905"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-46905",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-46905"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024022557-CVE-2021-46905-6507@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024022557-CVE-2021-46905-6507@gregkh/T"
}
],
"release_date": "2024-02-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: NULL-deref on disconnect regression"
},
{
"cve": "CVE-2021-46983",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-02-28T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2266906"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in an error-handling function in the Linux kernel\u0027s NVMe driver. This flaw allows an attacker with control over NVMe links to cause a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: nvmet-rdma: Fix NULL deref when SEND is completed with error",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-46983"
},
{
"category": "external",
"summary": "RHBZ#2266906",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266906"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-46983",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46983"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-46983",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-46983"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024022824-CVE-2021-46983-f808@gregkh/T/#u",
"url": "https://lore.kernel.org/linux-cve-announce/2024022824-CVE-2021-46983-f808@gregkh/T/#u"
}
],
"release_date": "2024-02-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: nvmet-rdma: Fix NULL deref when SEND is completed with error"
},
{
"cve": "CVE-2021-47011",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-02-28T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2266847"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: memcontrol: slab: fix obtain a reference to a freeing memcg\n\nPatch series \"Use obj_cgroup APIs to charge kmem pages\", v5.\n\nSince Roman\u0027s series \"The new cgroup slab memory controller\" applied.\nAll slab objects are charged with the new APIs of obj_cgroup. The new\nAPIs introduce a struct obj_cgroup to charge slab objects. It prevents\nlong-living objects from pinning the original memory cgroup in the\nmemory. But there are still some corner objects (e.g. allocations\nlarger than order-1 page on SLUB) which are not charged with the new\nAPIs. Those objects (include the pages which are allocated from buddy\nallocator directly) are charged as kmem pages which still hold a\nreference to the memory cgroup.\n\nE.g. We know that the kernel stack is charged as kmem pages because the\nsize of the kernel stack can be greater than 2 pages (e.g. 16KB on\nx86_64 or arm64). If we create a thread (suppose the thread stack is\ncharged to memory cgroup A) and then move it from memory cgroup A to\nmemory cgroup B. Because the kernel stack of the thread hold a\nreference to the memory cgroup A. The thread can pin the memory cgroup\nA in the memory even if we remove the cgroup A. If we want to see this\nscenario by using the following script. We can see that the system has\nadded 500 dying cgroups (This is not a real world issue, just a script\nto show that the large kmallocs are charged as kmem pages which can pin\nthe memory cgroup in the memory).\n\n\t#!/bin/bash\n\n\tcat /proc/cgroups | grep memory\n\n\tcd /sys/fs/cgroup/memory\n\techo 1 \u003e memory.move_charge_at_immigrate\n\n\tfor i in range{1..500}\n\tdo\n\t\tmkdir kmem_test\n\t\techo $$ \u003e kmem_test/cgroup.procs\n\t\tsleep 3600 \u0026\n\t\techo $$ \u003e cgroup.procs\n\t\techo `cat kmem_test/cgroup.procs` \u003e cgroup.procs\n\t\trmdir kmem_test\n\tdone\n\n\tcat /proc/cgroups | grep memory\n\nThis patchset aims to make those kmem pages to drop the reference to\nmemory cgroup by using the APIs of obj_cgroup. Finally, we can see that\nthe number of the dying cgroups will not increase if we run the above test\nscript.\n\nThis patch (of 7):\n\nThe rcu_read_lock/unlock only can guarantee that the memcg will not be\nfreed, but it cannot guarantee the success of css_get (which is in the\nrefill_stock when cached memcg changed) to memcg.\n\n rcu_read_lock()\n memcg = obj_cgroup_memcg(old)\n __memcg_kmem_uncharge(memcg)\n refill_stock(memcg)\n if (stock-\u003ecached != memcg)\n // css_get can change the ref counter from 0 back to 1.\n css_get(\u0026memcg-\u003ecss)\n rcu_read_unlock()\n\nThis fix is very like the commit:\n\n eefbfa7fd678 (\"mm: memcg/slab: fix use after free in obj_cgroup_charge\")\n\nFix this by holding a reference to the memcg which is passed to the\n__memcg_kmem_uncharge() before calling __memcg_kmem_uncharge().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mm: memcontrol: slab: fix obtain a reference to a freeing memcg",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47011"
},
{
"category": "external",
"summary": "RHBZ#2266847",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266847"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47011",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47011"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47011",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47011"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024022831-CVE-2021-47011-5b75@gregkh/T/#u",
"url": "https://lore.kernel.org/linux-cve-announce/2024022831-CVE-2021-47011-5b75@gregkh/T/#u"
}
],
"release_date": "2024-02-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: mm: memcontrol: slab: fix obtain a reference to a freeing memcg"
},
{
"cve": "CVE-2021-47080",
"cwe": {
"id": "CWE-369",
"name": "Divide By Zero"
},
"discovery_date": "2024-03-01T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2267533"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/core: Prevent divide-by-zero error triggered by the user\n\nThe user_entry_size is supplied by the user and later used as a\ndenominator to calculate number of entries. The zero supplied by the user\nwill trigger the following divide-by-zero error:\n\n divide error: 0000 [#1] SMP KASAN PTI\n CPU: 4 PID: 497 Comm: c_repro Not tainted 5.13.0-rc1+ #281\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\n RIP: 0010:ib_uverbs_handler_UVERBS_METHOD_QUERY_GID_TABLE+0x1b1/0x510\n Code: 87 59 03 00 00 e8 9f ab 1e ff 48 8d bd a8 00 00 00 e8 d3 70 41 ff 44 0f b7 b5 a8 00 00 00 e8 86 ab 1e ff 31 d2 4c 89 f0 31 ff \u003c49\u003e f7 f5 48 89 d6 48 89 54 24 10 48 89 04 24 e8 1b ad 1e ff 48 8b\n RSP: 0018:ffff88810416f828 EFLAGS: 00010246\n RAX: 0000000000000008 RBX: 1ffff1102082df09 RCX: ffffffff82183f3d\n RDX: 0000000000000000 RSI: ffff888105f2da00 RDI: 0000000000000000\n RBP: ffff88810416fa98 R08: 0000000000000001 R09: ffffed102082df5f\n R10: ffff88810416faf7 R11: ffffed102082df5e R12: 0000000000000000\n R13: 0000000000000000 R14: 0000000000000008 R15: ffff88810416faf0\n FS: 00007f5715efa740(0000) GS:ffff88811a700000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000000020000840 CR3: 000000010c2e0001 CR4: 0000000000370ea0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n Call Trace:\n ? ib_uverbs_handler_UVERBS_METHOD_INFO_HANDLES+0x4b0/0x4b0\n ib_uverbs_cmd_verbs+0x1546/0x1940\n ib_uverbs_ioctl+0x186/0x240\n __x64_sys_ioctl+0x38a/0x1220\n do_syscall_64+0x3f/0x80\n entry_SYSCALL_64_after_hwframe+0x44/0xae",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: RDMA/core: Prevent divide-by-zero error triggered by the user",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47080"
},
{
"category": "external",
"summary": "RHBZ#2267533",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267533"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47080",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47080"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47080",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47080"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024030142-CVE-2021-47080-eb20@gregkh/T/#u",
"url": "https://lore.kernel.org/linux-cve-announce/2024030142-CVE-2021-47080-eb20@gregkh/T/#u"
}
],
"release_date": "2024-03-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: RDMA/core: Prevent divide-by-zero error triggered by the user"
},
{
"cve": "CVE-2022-20166",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-08-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2122089"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s sysfs layer. This flaw allows a local user who can read files under the /sysfs mount point to corrupt memory or possibly crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: possible buffer overflow in sysfs reading",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-20166"
},
{
"category": "external",
"summary": "RHBZ#2122089",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122089"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-20166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20166"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-20166",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-20166"
}
],
"release_date": "2022-08-15T14:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: possible buffer overflow in sysfs reading"
},
{
"cve": "CVE-2022-50042",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373691"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the netlink driver in the Linux kernel. A memory leak can occur when allocated memory is not released in certain error cases, potentially impacting system performance and resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net: genl: fix error path memory leak in policy dumping",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue has been fixed in Red Hat Enterprise Linux 8.5, 9.2 and 9.3 via RHSA-2021:4356 [1], RHSA-2023:7370 [2] and RHSA-2023:6583 [3], respectively.\n\n[1]. https://access.redhat.com/errata/RHSA-2021:4356\n\n[2]. https://access.redhat.com/errata/RHSA-2023:7370\n\n[3]. https://access.redhat.com/errata/RHSA-2023:6583",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50042"
},
{
"category": "external",
"summary": "RHBZ#2373691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373691"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50042",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50042"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50042",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50042"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061843-CVE-2022-50042-7d6f@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061843-CVE-2022-50042-7d6f@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: net: genl: fix error path memory leak in policy dumping"
},
{
"cve": "CVE-2022-50073",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373494"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the tap module in the Linux kernel. A NULL pointer dereference can be triggered due to a missing initialization, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net: tap: NULL pointer derefence in dev_parse_header_protocol when skb-\u003edev is null",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue has been fixed in Red Hat Enterprise Linux 8.5 and 9.5 via RHSA-2021:4356 [1] and RHSA-2024:9315 [2], respectively.\n\n[1]. https://access.redhat.com/errata/RHSA-2021:4356\n\n[2]. https://access.redhat.com/errata/RHSA-2024:9315",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50073"
},
{
"category": "external",
"summary": "RHBZ#2373494",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373494"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50073",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50073"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50073",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50073"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061854-CVE-2022-50073-7199@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061854-CVE-2022-50073-7199@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net: tap: NULL pointer derefence in dev_parse_header_protocol when skb-\u003edev is null"
},
{
"cve": "CVE-2023-53598",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2025-10-04T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2401500"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbus: mhi: host: Range check CHDBOFF and ERDBOFF\n\nIf the value read from the CHDBOFF and ERDBOFF registers is outside the\nrange of the MHI register space then an invalid address might be computed\nwhich later causes a kernel panic. Range check the read value to prevent\na crash due to bad data from the device.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: bus: mhi: host: Range check CHDBOFF and ERDBOFF",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "MHI devices communicate channel configuration through doorbell offset values (CHDBOFF and ERDBOFF) that index into the device\u0027s register space. The driver reads these offsets from device memory during initialization but historically failed to validate that they fall within legitimate bounds. A malicious device\u2014or a legitimate device with corrupted firmware\u2014can supply offset values that point outside the allocated channel context array. When the driver attempts to use these offsets, it accesses arbitrary kernel memory, typically triggering an immediate panic. Physical access is generally required to connect a malicious device, though in some cases (like M.2 modems) a compromised device firmware could supply bad values.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-53598"
},
{
"category": "external",
"summary": "RHBZ#2401500",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401500"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-53598",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53598"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-53598",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-53598"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025100429-CVE-2023-53598-cbd8@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025100429-CVE-2023-53598-cbd8@gregkh/T"
}
],
"release_date": "2025-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: bus: mhi: host: Range check CHDBOFF and ERDBOFF"
}
]
}
rhsa-2021:4140
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n* kernel: out-of-bounds reads in pinctrl subsystem. (CVE-2020-0427)\n* kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24502)\n* kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24503)\n* kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24504)\n* kernel: Fragmentation cache not cleared on reconnection (CVE-2020-24586)\n* kernel: Reassembling fragments encrypted under different keys (CVE-2020-24587)\n* kernel: wifi frame payload being parsed incorrectly as an L2 frame (CVE-2020-24588)\n* kernel: Forwarding EAPOL from unauthenticated wifi client (CVE-2020-26139)\n* kernel: accepting plaintext data frames in protected networks (CVE-2020-26140)\n* kernel: not verifying TKIP MIC of fragmented frames (CVE-2020-26141)\n* kernel: accepting fragmented plaintext frames in protected networks (CVE-2020-26143)\n* kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header (CVE-2020-26144)\n* kernel: accepting plaintext broadcast fragments as full frames (CVE-2020-26145)\n* kernel: locking inconsistency in tty_io.c and tty_jobctrl.c can lead to a read-after-free (CVE-2020-29660)\n* kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function via a long SSID value (CVE-2020-36158)\n* kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() (CVE-2020-36386)\n* kernel: Improper access control in BlueZ may allow information disclosure vulnerability. (CVE-2021-0129)\n* kernel: Use-after-free in ndb_queue_rq() (CVE-2021-3348)\n* kernel: Linux kernel eBPF RINGBUF map oversized allocation (CVE-2021-3489)\n* kernel: double free in bluetooth subsystem when the HCI device initialization fails (CVE-2021-3564)\n* kernel: use-after-free in function hci_sock_bound_ioctl() (CVE-2021-3573)\n* kernel: eBPF 32-bit source register truncation on div/mod (CVE-2021-3600)\n* kernel: DoS in rb_per_cpu_empty() (CVE-2021-3679)\n* kernel: overlayfs: Mounting overlayfs inside an unprivileged user namespace can reveal files (CVE-2021-3732)\n* kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt() (CVE-2021-20194)\n* kernel: Race condition in sctp_destroy_sock list_del (CVE-2021-23133)\n* kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode (CVE-2021-28950)\n* kernel: System crash in intel_pmu_drain_pebs_nhm (CVE-2021-28971)\n* kernel: protection for sequences of pointer arithmetic operations against speculatively out-of-bounds loads can be bypassed to leak content of kernel memory (CVE-2021-29155)\n* kernel: improper input validation in tipc_nl_retrieve_key function (CVE-2021-29646)\n* kernel: lack a full memory barrier upon the assignment of a new table value in x_tables.h may lead to DoS (CVE-2021-29650)\n* kernel: local escalation of privileges in handling of eBPF programs (CVE-2021-31440)\n* kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory (CVE-2021-31829)\n* kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier (CVE-2021-33200)\n* kernel: reassembling encrypted fragments with non-consecutive packet numbers (CVE-2020-26146)\n* kernel: reassembling mixed encrypted/plaintext fragments (CVE-2020-26147)\n* kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check (CVE-2020-29368)\n* kernel: flowtable list del corruption with kernel BUG (CVE-2021-3635)\n* kernel: NULL pointer dereference in llsec_key_alloc() (CVE-2021-3659)\n* kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure (CVE-2021-20239)\n* kernel: out of bounds array access in drivers/md/dm-ioctl.c (CVE-2021-31916)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:4140",
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/"
},
{
"category": "external",
"summary": "1875275",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1875275"
},
{
"category": "external",
"summary": "1902412",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902412"
},
{
"category": "external",
"summary": "1903244",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903244"
},
{
"category": "external",
"summary": "1905747",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905747"
},
{
"category": "external",
"summary": "1906522",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906522"
},
{
"category": "external",
"summary": "1912683",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912683"
},
{
"category": "external",
"summary": "1913348",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913348"
},
{
"category": "external",
"summary": "1919893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919893"
},
{
"category": "external",
"summary": "1921958",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921958"
},
{
"category": "external",
"summary": "1923636",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1923636"
},
{
"category": "external",
"summary": "1930376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930376"
},
{
"category": "external",
"summary": "1930379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930379"
},
{
"category": "external",
"summary": "1930381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930381"
},
{
"category": "external",
"summary": "1941762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941762"
},
{
"category": "external",
"summary": "1941784",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941784"
},
{
"category": "external",
"summary": "1945345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945345"
},
{
"category": "external",
"summary": "1945388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945388"
},
{
"category": "external",
"summary": "1946965",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946965"
},
{
"category": "external",
"summary": "1948772",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1948772"
},
{
"category": "external",
"summary": "1951595",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951595"
},
{
"category": "external",
"summary": "1957788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1957788"
},
{
"category": "external",
"summary": "1959559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959559"
},
{
"category": "external",
"summary": "1959642",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959642"
},
{
"category": "external",
"summary": "1959654",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959654"
},
{
"category": "external",
"summary": "1959657",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959657"
},
{
"category": "external",
"summary": "1959663",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959663"
},
{
"category": "external",
"summary": "1960490",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960490"
},
{
"category": "external",
"summary": "1960492",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960492"
},
{
"category": "external",
"summary": "1960496",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960496"
},
{
"category": "external",
"summary": "1960498",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960498"
},
{
"category": "external",
"summary": "1960500",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960500"
},
{
"category": "external",
"summary": "1960502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960502"
},
{
"category": "external",
"summary": "1960504",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960504"
},
{
"category": "external",
"summary": "1964028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964028"
},
{
"category": "external",
"summary": "1964139",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964139"
},
{
"category": "external",
"summary": "1965038",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965038"
},
{
"category": "external",
"summary": "1965458",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965458"
},
{
"category": "external",
"summary": "1966578",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966578"
},
{
"category": "external",
"summary": "1969489",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1969489"
},
{
"category": "external",
"summary": "1975949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975949"
},
{
"category": "external",
"summary": "1976946",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976946"
},
{
"category": "external",
"summary": "1981954",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981954"
},
{
"category": "external",
"summary": "1989165",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989165"
},
{
"category": "external",
"summary": "1995249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995249"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4140.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2025-10-10T02:11:17+00:00",
"generator": {
"date": "2025-10-10T02:11:17+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:4140",
"initial_release_date": "2021-11-09T17:26:23+00:00",
"revision_history": [
{
"date": "2021-11-09T17:26:23+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-11-09T17:26:23+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T02:11:17+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::nfv"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::realtime"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"product": {
"name": "kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"product_id": "kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-348.rt7.130.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-348.rt7.130.el8.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src"
},
"product_reference": "kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-348.rt7.130.el8.src as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src"
},
"product_reference": "kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-14615",
"cwe": {
"id": "CWE-212",
"name": "Improper Removal of Sensitive Information Before Storage or Transfer"
},
"discovery_date": "2020-01-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1789209"
}
],
"notes": [
{
"category": "description",
"text": "An information disclosure flaw was found in the Linux kernel. The i915 graphics driver lacks control of flow for data structures which may allow a local, authenticated user to disclose information when using ioctl commands with an attached i915 device. The highest threat from this vulnerability is to data confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Intel graphics card information leak.",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, 8 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 6, 7, and 8 may address this issue.\n\nThis has been rated as having Moderate security impact and is not currently planned to be addressed in future updates of Red Hat Enterprise MRG 2.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-14615"
},
{
"category": "external",
"summary": "RHBZ#1789209",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789209"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-14615",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14615"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14615",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14615"
}
],
"release_date": "2020-01-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Preventing loading of the i915 kernel module will prevent attackers from using this exploit against the system; however, the power management functionality of the card will be disabled and the system may draw additional power. See the kcs \u201cHow do I blacklist a kernel module to prevent it from loading automatically?\u201c (https://access.redhat.com/solutions/41278) for instructions on how to disable a kernel module from autoloading. Graphical displays may also be at low resolution or not work correctly.\n\nThis mitigation may not be suitable if the graphical login functionality is required.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Intel graphics card information leak."
},
{
"cve": "CVE-2020-0427",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-01-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1919893"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux pinctrl system. It is possible to trigger an of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds reads in pinctrl subsystem.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-0427"
},
{
"category": "external",
"summary": "RHBZ#1919893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919893"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-0427",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0427"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0427",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0427"
}
],
"release_date": "2020-11-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: out-of-bounds reads in pinctrl subsystem."
},
{
"cve": "CVE-2020-24502",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-02-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1930379"
}
],
"notes": [
{
"category": "description",
"text": "Improper input validation in some Intel(R) Ethernet E810 Adapter drivers for Linux may allow an authenticated user to potentially enable a denial of service via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24502"
},
{
"category": "external",
"summary": "RHBZ#1930379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930379"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24502",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24502"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24502",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24502"
}
],
"release_date": "2021-02-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers"
},
{
"cve": "CVE-2020-24503",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-02-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1930381"
}
],
"notes": [
{
"category": "description",
"text": "Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers for Linux may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24503"
},
{
"category": "external",
"summary": "RHBZ#1930381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930381"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24503",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24503"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24503",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24503"
}
],
"release_date": "2021-02-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers"
},
{
"cve": "CVE-2020-24504",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-02-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1930376"
}
],
"notes": [
{
"category": "description",
"text": "An uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers for Linux may allow an authenticated user to potentially cause a denial of service via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24504"
},
{
"category": "external",
"summary": "RHBZ#1930376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930376"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24504",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24504"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24504",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24504"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html"
}
],
"release_date": "2021-02-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers"
},
{
"cve": "CVE-2020-24586",
"cwe": {
"id": "CWE-212",
"name": "Improper Removal of Sensitive Information Before Storage or Transfer"
},
"discovery_date": "2021-05-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1959642"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernels implementation of wifi fragmentation handling. An attacker with the ability to transmit within the wireless transmission range of an access point can abuse a flaw where previous contents of wifi fragments can be unintentionally transmitted to another device.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Fragmentation cache not cleared on reconnection",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "RHBZ#1959642",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959642"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24586"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/"
}
],
"release_date": "2021-05-12T01:20:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Fragmentation cache not cleared on reconnection"
},
{
"cve": "CVE-2020-24587",
"cwe": {
"id": "CWE-345",
"name": "Insufficient Verification of Data Authenticity"
},
"discovery_date": "2021-05-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1959654"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u0027s WiFi implementation. An attacker within the wireless range can abuse a logic flaw in the WiFi implementation by reassembling packets from multiple fragments under different keys, treating them as valid. This flaw allows an attacker to send a fragment under an incorrect key, treating them as a valid fragment under the new key. The highest threat from this vulnerability is to confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Reassembling fragments encrypted under different keys",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "RHBZ#1959654",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959654"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24587",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24587"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24587",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24587"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/"
}
],
"release_date": "2021-05-11T14:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.1,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Reassembling fragments encrypted under different keys"
},
{
"cve": "CVE-2020-24588",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-05-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1959657"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernels wifi implementation. An attacker within wireless broadcast range can inject custom data into the wireless communication circumventing checks on the data. This can cause the frame to pass checks and be considered a valid frame of a different type.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: wifi frame payload being parsed incorrectly as an L2 frame",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "RHBZ#1959657",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959657"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24588",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24588"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24588",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24588"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.25d93176ddaf.I9e265b597f2cd23eb44573f35b625947b386a9de@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.25d93176ddaf.I9e265b597f2cd23eb44573f35b625947b386a9de@changeid/"
}
],
"release_date": "2021-05-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: wifi frame payload being parsed incorrectly as an L2 frame"
},
{
"cve": "CVE-2020-26139",
"cwe": {
"id": "CWE-829",
"name": "Inclusion of Functionality from Untrusted Control Sphere"
},
"discovery_date": "2021-05-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1959663"
}
],
"notes": [
{
"category": "description",
"text": "Frames used for authentication and key management between the AP and connected clients. Some clients may take these redirected frames masquerading as control mechanisms from the AP.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Forwarding EAPOL from unauthenticated wifi client",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26139"
},
{
"category": "external",
"summary": "RHBZ#1959663",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959663"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26139"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26139",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26139"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.cb327ed0cabe.Ib7dcffa2a31f0913d660de65ba3c8aca75b1d10f@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.cb327ed0cabe.Ib7dcffa2a31f0913d660de65ba3c8aca75b1d10f@changeid/"
}
],
"release_date": "2021-05-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Forwarding EAPOL from unauthenticated wifi client"
},
{
"cve": "CVE-2020-26140",
"cwe": {
"id": "CWE-346",
"name": "Origin Validation Error"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960490"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Linux kernel. Where the WiFi implementations accept plaintext frames in a protected WiFi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: accepting plaintext data frames in protected networks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26140"
},
{
"category": "external",
"summary": "RHBZ#1960490",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960490"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26140",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26140"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26140",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26140"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: accepting plaintext data frames in protected networks"
},
{
"cve": "CVE-2020-26141",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960492"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Linux kernel\u0027s WiFi implementation. An attacker within wireless range can inject a control packet fragment where the kernel does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: not verifying TKIP MIC of fragmented frames",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "RHBZ#1960492",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960492"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26141"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26141",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26141"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.c3f1d42c6746.I795593fcaae941c471425b8c7d5f7bb185d29142@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.c3f1d42c6746.I795593fcaae941c471425b8c7d5f7bb185d29142@changeid/"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: not verifying TKIP MIC of fragmented frames"
},
{
"cve": "CVE-2020-26143",
"cwe": {
"id": "CWE-346",
"name": "Origin Validation Error"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960496"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Linux kernel, where the WiFi implementations assemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: accepting fragmented plaintext frames in protected networks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26143"
},
{
"category": "external",
"summary": "RHBZ#1960496",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960496"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26143",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26143"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26143",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26143"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: accepting fragmented plaintext frames in protected networks"
},
{
"cve": "CVE-2020-26144",
"cwe": {
"id": "CWE-290",
"name": "Authentication Bypass by Spoofing"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960498"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel, where the WiFi implementations accept plaintext A-MSDU frames as long as the first 8 bytes correspond to a valid RFC1042 (ex., LLC/SNAP) header for EAPOL. The highest threat from this vulnerability is to integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26144"
},
{
"category": "external",
"summary": "RHBZ#1960498",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960498"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26144",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26144"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26144",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26144"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header"
},
{
"cve": "CVE-2020-26145",
"cwe": {
"id": "CWE-307",
"name": "Improper Restriction of Excessive Authentication Attempts"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960500"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in ath10k_htt_rx_proc_rx_frag_ind_hl in drivers/net/wireless/ath/ath10k/htt_rx.c in the Linux kernel WiFi implementations, where it accepts a second (or subsequent) broadcast fragments even when sent in plaintext and then process them as full unfragmented frames. The highest threat from this vulnerability is to integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: accepting plaintext broadcast fragments as full frames",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26145"
},
{
"category": "external",
"summary": "RHBZ#1960500",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960500"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26145"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26145",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26145"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.9ca6ca7945a9.I1e18b514590af17c155bda86699bc3a971a8dcf4@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.9ca6ca7945a9.I1e18b514590af17c155bda86699bc3a971a8dcf4@changeid/"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: accepting plaintext broadcast fragments as full frames"
},
{
"cve": "CVE-2020-26146",
"cwe": {
"id": "CWE-307",
"name": "Improper Restriction of Excessive Authentication Attempts"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960502"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Linux kernel, where the WiFi implementation reassemble fragments with non-consecutive packet numbers. An adversary can abuse this to exfiltrate selected fragments. This vulnerability is exploitable when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used. Note that WEP is vulnerable to this attack by design.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: reassembling encrypted fragments with non-consecutive packet numbers",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26146"
},
{
"category": "external",
"summary": "RHBZ#1960502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960502"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26146"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26146",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26146"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: reassembling encrypted fragments with non-consecutive packet numbers"
},
{
"cve": "CVE-2020-26147",
"cwe": {
"id": "CWE-307",
"name": "Improper Restriction of Excessive Authentication Attempts"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960504"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in ieee80211_rx_h_defragment in net/mac80211/rx.c in the Linux Kernel\u0027s WiFi implementation. This vulnerability can be abused to inject packets or exfiltrate selected fragments when another device sends fragmented frames, and the WEP, CCMP, or GCMP data-confidentiality protocol is used. The highest threat from this vulnerability is to integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: reassembling mixed encrypted/plaintext fragments",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26147"
},
{
"category": "external",
"summary": "RHBZ#1960504",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960504"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26147",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26147"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.30c4394bb835.I5acfdb552cc1d20c339c262315950b3eac491397@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.30c4394bb835.I5acfdb552cc1d20c339c262315950b3eac491397@changeid/"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: reassembling mixed encrypted/plaintext fragments"
},
{
"cve": "CVE-2020-29368",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-12-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903244"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw has been rated as having Moderateimpact because, based on Red Hat\u0027s assessment, this issue is hard to exploit in practice because the race window is too small for it to be reliable.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-29368"
},
{
"category": "external",
"summary": "RHBZ#1903244",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903244"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-29368",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29368"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29368",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29368"
}
],
"release_date": "2020-06-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check"
},
{
"cve": "CVE-2020-29660",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2020-12-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1906522"
}
],
"notes": [
{
"category": "description",
"text": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel. A local user could use this flaw to read numerical value from memory after free.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: locking inconsistency in drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c can lead to a read-after-free",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having Low impact (Red Hat Enterprise Linux 7) because of the need to have CAP_SYS_TTY_CONFIG privileges.\n\nThis flaw is rated as having Moderate (Red Hat Enterprise Linux 8) impact because of the need to have CAP_SYS_TTY_CONFIG privileges. Red Hat Enterprise Linux 8 enabled unprivileged user/network namespaces by default which can be used to exercise this vulnerability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-29660"
},
{
"category": "external",
"summary": "RHBZ#1906522",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906522"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-29660",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29660"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29660",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29660"
}
],
"release_date": "2020-12-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: locking inconsistency in drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c can lead to a read-after-free"
},
{
"cve": "CVE-2020-36158",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2021-01-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1913348"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. The marvell wifi driver could allow a local attacker to execute arbitrary code via a long SSID value in mwifiex_cmd_802_11_ad_hoc_start function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function in drivers/net/wireless/marvell/mwifiex/join.c via a long SSID value",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having Moderate impact because the attacker needs to be local and privileged enough to be able to initiate ad-hoc WIFI network creation.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36158"
},
{
"category": "external",
"summary": "RHBZ#1913348",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913348"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36158",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36158"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36158",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36158"
}
],
"release_date": "2020-12-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module mwifiex from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function in drivers/net/wireless/marvell/mwifiex/join.c via a long SSID value"
},
{
"cve": "CVE-2020-36312",
"cwe": {
"id": "CWE-772",
"name": "Missing Release of Resource after Effective Lifetime"
},
"discovery_date": "2021-04-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1947991"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the KVM hypervisor of the Linux kernel. A memory leak could occur in kvm_io_bus_unregister_dev() upon a kmalloc failure. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: memory leak upon a kmalloc failure in kvm_io_bus_unregister_dev function in virt/kvm/kvm_main.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36312"
},
{
"category": "external",
"summary": "RHBZ#1947991",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1947991"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36312",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36312"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36312",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36312"
}
],
"release_date": "2020-09-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: memory leak upon a kmalloc failure in kvm_io_bus_unregister_dev function in virt/kvm/kvm_main.c"
},
{
"cve": "CVE-2020-36386",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2021-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1969489"
}
],
"notes": [
{
"category": "description",
"text": "A flaw out of bounds memory access in the Linux kernel bluetooth subsystem was found in the way when some data being read about the bluetooth device with the hci_extended_inquiry_result_evt call. A local user could use this flaw to crash the system or read some data out of memory bounds that can lead to data confidentiality threat.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() in net/bluetooth/hci_event.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having a Moderate impact because even the data being read out of memory bounds is written to some cache, it was known before that this data from non-safe source and as result no any sensitive dependencies on this data.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36386"
},
{
"category": "external",
"summary": "RHBZ#1969489",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1969489"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36386",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36386"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36386",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36386"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51c19bf3d5cfaa66571e4b88ba2a6f6295311101",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51c19bf3d5cfaa66571e4b88ba2a6f6295311101"
}
],
"release_date": "2020-07-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module bluetooth from being loaded (if Bluetooth not required for the system). Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() in net/bluetooth/hci_event.c"
},
{
"cve": "CVE-2021-0129",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965038"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access. The highest threat from this vulnerability is to data confidentiality and integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper access control in BlueZ may allow information disclosure vulnerability.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0129"
},
{
"category": "external",
"summary": "RHBZ#1965038",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965038"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0129"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0129",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0129"
}
],
"release_date": "2021-06-08T03:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Improper access control in BlueZ may allow information disclosure vulnerability."
},
{
"cve": "CVE-2021-3348",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-01-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1921958"
}
],
"notes": [
{
"category": "description",
"text": "A use after free flaw in the Linux kernel network block device (NBD) subsystem was found in the way user calls an ioctl NBD_SET_SOCK at a certain point during device setup.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use-after-free in ndb_queue_rq() in drivers/block/nbd.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having a Moderate impact because in the default configuration, the issue can only be triggered by a privileged local user (with access to the nbd device).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3348"
},
{
"category": "external",
"summary": "RHBZ#1921958",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921958"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3348",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3348"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3348",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3348"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-block/24dff677353e2e30a71d8b66c4dffdbdf77c4dbd.1611595239.git.josef@toxicpanda.com/",
"url": "https://lore.kernel.org/linux-block/24dff677353e2e30a71d8b66c4dffdbdf77c4dbd.1611595239.git.josef@toxicpanda.com/"
}
],
"release_date": "2021-01-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module nbd from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Use-after-free in ndb_queue_rq() in drivers/block/nbd.c"
},
{
"acknowledgments": [
{
"names": [
"Ryota Shiga"
]
}
],
"cve": "CVE-2021-3489",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1959559"
}
],
"notes": [
{
"category": "description",
"text": "A flaw out of bound memory write in the Linux kernel BPF subsystem was found in the way user writes to BPF ring buffer too fast, so larger buffer than available memory could be allocated. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Linux kernel eBPF RINGBUF map oversized allocation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3489"
},
{
"category": "external",
"summary": "RHBZ#1959559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959559"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3489",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3489"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3489",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3489"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=4b81ccebaeee885ab1aa1438133f2991e3a2b6ea",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=4b81ccebaeee885ab1aa1438133f2991e3a2b6ea"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/05/11/10",
"url": "https://www.openwall.com/lists/oss-security/2021/05/11/10"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Linux kernel eBPF RINGBUF map oversized allocation"
},
{
"acknowledgments": [
{
"names": [
"HaoXiong, LinMa"
],
"organization": "ckSec"
}
],
"cve": "CVE-2021-3564",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"discovery_date": "2021-05-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1964139"
}
],
"notes": [
{
"category": "description",
"text": "A flaw double-free memory corruption in the Linux kernel HCI device initialization subsystem was found in the way user attach malicious HCI TTY Bluetooth device. A local user could use this flaw to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: double free in bluetooth subsystem when the HCI device initialization fails",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The impact is Moderate, because the double free happens during flush procedure, and no use of incorrect data during flush finishing even if double free could happen without kernel crash.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3564"
},
{
"category": "external",
"summary": "RHBZ#1964139",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964139"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3564"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3564",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3564"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/05/25/1",
"url": "https://www.openwall.com/lists/oss-security/2021/05/25/1"
}
],
"release_date": "2021-05-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: double free in bluetooth subsystem when the HCI device initialization fails"
},
{
"cve": "CVE-2021-3573",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1966578"
}
],
"notes": [
{
"category": "description",
"text": "A flaw use-after-free in function hci_sock_bound_ioctl() of the Linux kernel HCI subsystem was found in the way user calls ioct HCIUNBLOCKADDR or other way triggers race condition of the call hci_unregister_dev() together with one of the calls hci_sock_blacklist_add(), hci_sock_blacklist_del(), hci_get_conn_info(), hci_get_auth_info(). A privileged local user could use this flaw to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in function hci_sock_bound_ioctl()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having a Moderate impact because of the privileges (CAP_NET_ADMIN in initial namespace) required for exploiting the issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3573"
},
{
"category": "external",
"summary": "RHBZ#1966578",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966578"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3573",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3573"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth.git/commit/?id=e305509e678b3a4af2b3cfd410f409f7cdaabb52",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth.git/commit/?id=e305509e678b3a4af2b3cfd410f409f7cdaabb52"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/06/08/2",
"url": "https://www.openwall.com/lists/oss-security/2021/06/08/2"
}
],
"release_date": "2021-06-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising easThe required privileges is CAP_NET_ADMIN capabilities. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.e of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in function hci_sock_bound_ioctl()"
},
{
"cve": "CVE-2021-3600",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1981954"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s eBPF verification code, where the eBPF 32-bit div/mod source register truncation could lead to out-of-bounds reads and writes. By default, accessing the eBPF verifier is only possible to privileged users with CAP_SYS_ADMIN. This flaw allows a local user who can run eBPF instructions to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: eBPF 32-bit source register truncation on div/mod",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3600"
},
{
"category": "external",
"summary": "RHBZ#1981954",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981954"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3600"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3600",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3600"
},
{
"category": "external",
"summary": "https://lore.kernel.org/patchwork/patch/1379497/",
"url": "https://lore.kernel.org/patchwork/patch/1379497/"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/06/23/1",
"url": "https://www.openwall.com/lists/oss-security/2021/06/23/1"
}
],
"release_date": "2021-06-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: eBPF 32-bit source register truncation on div/mod"
},
{
"cve": "CVE-2021-3635",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-06-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1976946"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel netfilter implementation. A user with root (CAP_SYS_ADMIN) access is able to panic the system when issuing netfilter netflow commands",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: flowtable list del corruption with kernel BUG at lib/list_debug.c:50",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3635"
},
{
"category": "external",
"summary": "RHBZ#1976946",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976946"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3635",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3635"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3635",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3635"
}
],
"release_date": "2021-08-06T04:47:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: flowtable list del corruption with kernel BUG at lib/list_debug.c:50"
},
{
"cve": "CVE-2021-3659",
"cwe": {
"id": "CWE-252",
"name": "Unchecked Return Value"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1975949"
}
],
"notes": [
{
"category": "description",
"text": "A NULL pointer dereference flaw was found in the Linux kernel\u2019s IEEE 802.15.4 wireless networking subsystem in the way the user closes the LR-WPAN connection. This flaw allows a local user to crash the system. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3659"
},
{
"category": "external",
"summary": "RHBZ#1975949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975949"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3659",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3659"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3659",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3659"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8"
}
],
"release_date": "2021-04-06T19:22:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module mac802154 from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c"
},
{
"acknowledgments": [
{
"names": [
"Haoran Luo"
],
"organization": "Chaitin Tech"
}
],
"cve": "CVE-2021-3679",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-07-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1989165"
}
],
"notes": [
{
"category": "description",
"text": "A lack of CPU resources in the Linux kernel tracing module functionality was found in the way users use the trace ring buffer in specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: DoS in rb_per_cpu_empty()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3679"
},
{
"category": "external",
"summary": "RHBZ#1989165",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989165"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3679",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3679"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3679",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3679"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20210723125527.767d1c18@oasis.local.home/",
"url": "https://lore.kernel.org/lkml/20210723125527.767d1c18@oasis.local.home/"
}
],
"release_date": "2021-07-20T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: DoS in rb_per_cpu_empty()"
},
{
"acknowledgments": [
{
"names": [
"Miklos Szeredi"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2021-3732",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-08-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1995249"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s OverlayFS subsystem in the way the user mounts the TmpFS filesystem with OverlayFS. This flaw allows a local user to gain access to hidden files that should not be accessible.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: overlayfs: Mounting overlayfs inside an unprivileged user namespace can reveal files",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3732"
},
{
"category": "external",
"summary": "RHBZ#1995249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995249"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3732",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3732"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3732",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3732"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=427215d85e8d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=427215d85e8d"
}
],
"release_date": "2021-08-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: overlayfs: Mounting overlayfs inside an unprivileged user namespace can reveal files"
},
{
"acknowledgments": [
{
"names": [
"Loris Reiff"
]
}
],
"cve": "CVE-2021-20194",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2020-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1912683"
}
],
"notes": [
{
"category": "description",
"text": "A flaw buffer overflow in the Linux kernel BPF subsystem was found in the way user running BPF script calling getsockopt. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having Moderate impact because of the need to have elevated privileges or non-standard configuration for running BPF script.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-20194"
},
{
"category": "external",
"summary": "RHBZ#1912683",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912683"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-20194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20194"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20194",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20194"
}
],
"release_date": "2021-01-22T10:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\n\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt()"
},
{
"cve": "CVE-2021-20239",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1923636"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the BPF protocol. This flaw allows an attacker with a local account to leak information about kernel internal addresses. The highest threat from this vulnerability is to confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-20239"
},
{
"category": "external",
"summary": "RHBZ#1923636",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1923636"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-20239",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20239"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20239",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20239"
}
],
"release_date": "2021-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Loading a filter is a privileged (CAP_SYS_ADMIN or root) operation. Once any filter is used, this attack is capable of being used by an unprivileged user. There is no known mitigation that product security finds suitable for this flaw.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.8,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure"
},
{
"acknowledgments": [
{
"names": [
"Or Cohen"
],
"organization": "Palo Alto Networks"
}
],
"cve": "CVE-2021-23133",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-04-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1948772"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s SCTP socket functionality that triggers a race condition. This flaw allows a local user to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Race condition in sctp_destroy_sock list_del",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having a Moderate impact because of the privileges required for running the known reproducer. The required privileges are CAP_BPF and CAP_NET_ADMIN capabilities that are disabled by default in Red Hat Enterprise Linux 7. For Red Hat Enterprise Linux 8, the SCTP protocol itself is disabled by default and cannot be used by a user without enablement by an administrator.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-23133"
},
{
"category": "external",
"summary": "RHBZ#1948772",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1948772"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23133"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23133",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23133"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b"
}
],
"release_date": "2021-04-18T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module sctp from being loaded (and this is so by default for Red Hat Enterprise Linux 8). Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Race condition in sctp_destroy_sock list_del"
},
{
"cve": "CVE-2021-28950",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2021-03-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1941762"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service in the kernel side of the FUSE functionality can allow a local system to create a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-28950"
},
{
"category": "external",
"summary": "RHBZ#1941762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941762"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-28950",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28950"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-28950",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-28950"
}
],
"release_date": "2021-03-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "As the FUSE module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install fuse /bin/true\" \u003e\u003e /etc/modprobe.d/disable-fuse.conf\n\nThe system will need to be restarted if the FUSE modules are loaded. In most circumstances, the CIFS kernel modules will be unable to be unloaded while the FUSE filesystems are in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode"
},
{
"cve": "CVE-2021-28971",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2021-03-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1941784"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. On some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: System crash in intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-28971"
},
{
"category": "external",
"summary": "RHBZ#1941784",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941784"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-28971",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28971"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-28971",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-28971"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: System crash in intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c"
},
{
"cve": "CVE-2021-29155",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2021-04-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1951595"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was discovered in retrieve_ptr_limit in kernel/bpf/verifier.c in the Linux kernel mechanism to mitigate speculatively out-of-bounds loads (Spectre mitigation). In this flaw a local, special user privileged (CAP_SYS_ADMIN) BPF program running on affected systems may bypass the protection, and execute speculatively out-of-bounds loads from the kernel memory. This can be abused to extract contents of kernel memory via side-channel.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: protection for sequences of pointer arithmetic operations against speculatively out-of-bounds loads can be bypassed to leak content of kernel memory",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29155"
},
{
"category": "external",
"summary": "RHBZ#1951595",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951595"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29155"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29155",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29155"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/04/18/4",
"url": "https://www.openwall.com/lists/oss-security/2021/04/18/4"
}
],
"release_date": "2021-04-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: protection for sequences of pointer arithmetic operations against speculatively out-of-bounds loads can be bypassed to leak content of kernel memory"
},
{
"cve": "CVE-2021-29646",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-03-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1945345"
}
],
"notes": [
{
"category": "description",
"text": "A flaw buffer overflow in the Linux kernel TIPC protocol functionality was found in the way user uses protocol with encryption enabled. A local user could use this flaw to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: improper input validation in tipc_nl_retrieve_key function in net/tipc/node.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29646"
},
{
"category": "external",
"summary": "RHBZ#1945345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945345"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29646",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29646"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29646",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29646"
}
],
"release_date": "2021-03-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: improper input validation in tipc_nl_retrieve_key function in net/tipc/node.c"
},
{
"cve": "CVE-2021-29650",
"cwe": {
"id": "CWE-662",
"name": "Improper Synchronization"
},
"discovery_date": "2021-03-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1945388"
}
],
"notes": [
{
"category": "description",
"text": "A denial-of-service (DoS) flaw was identified in the Linux kernel due to an incorrect memory barrier in xt_replace_table in net/netfilter/x_tables.c in the netfilter subsystem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29650"
},
{
"category": "external",
"summary": "RHBZ#1945388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945388"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29650",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29650"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1"
}
],
"release_date": "2021-03-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS"
},
{
"acknowledgments": [
{
"names": [
"Manfred Paul"
],
"organization": "RedRocket CTF team"
}
],
"cve": "CVE-2021-31440",
"cwe": {
"id": "CWE-682",
"name": "Incorrect Calculation"
},
"discovery_date": "2021-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1964028"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds access flaw was found in the Linux kernel\u2019s implementation of the eBPF code verifier, where an incorrect register bounds calculation while checking unsigned 32-bit instructions in an eBPF program occurs.. By default accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN. The issue results from the lack of proper validation of user-supplied eBPF programs prior to executing them. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: local escalation of privileges in handling of eBPF programs",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-31440"
},
{
"category": "external",
"summary": "RHBZ#1964028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964028"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-31440",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31440"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31440",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31440"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=10bf4e83167cc68595b85fd73bb91e8f2c086e36",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=10bf4e83167cc68595b85fd73bb91e8f2c086e36"
},
{
"category": "external",
"summary": "https://www.zerodayinitiative.com/blog/2021/5/26/cve-2021-31440-an-incorrect-bounds-calculation-in-the-linux-kernel-ebpf-verifier",
"url": "https://www.zerodayinitiative.com/blog/2021/5/26/cve-2021-31440-an-incorrect-bounds-calculation-in-the-linux-kernel-ebpf-verifier"
}
],
"release_date": "2021-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: local escalation of privileges in handling of eBPF programs"
},
{
"cve": "CVE-2021-31829",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-05-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1957788"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u0027s eBPF verification code. By default, accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN. This flaw allows a local user who can insert eBPF instructions, to use the eBPF verifier to abuse a spectre-like flaw and infer all system memory. The highest threat from this vulnerability is to confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-31829"
},
{
"category": "external",
"summary": "RHBZ#1957788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1957788"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-31829",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31829"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31829",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31829"
}
],
"release_date": "2021-04-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 and 8 kernel to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory"
},
{
"cve": "CVE-2021-31916",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-03-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1946965"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel. A bound check failure allows an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash, a leak of internal kernel information, or a privilege escalation problem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out of bounds array access in drivers/md/dm-ioctl.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated a Low impact because in the default configuration, the issue can only be triggered by a privileged local user.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-31916"
},
{
"category": "external",
"summary": "RHBZ#1946965",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946965"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-31916",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31916"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31916",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31916"
},
{
"category": "external",
"summary": "https://github.com/torvalds/linux/commit/4edbe1d7bcffcd6269f3b5eb63f710393ff2ec7a",
"url": "https://github.com/torvalds/linux/commit/4edbe1d7bcffcd6269f3b5eb63f710393ff2ec7a"
},
{
"category": "external",
"summary": "https://seclists.org/oss-sec/2021/q1/268",
"url": "https://seclists.org/oss-sec/2021/q1/268"
}
],
"release_date": "2021-03-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: out of bounds array access in drivers/md/dm-ioctl.c"
},
{
"cve": "CVE-2021-33033",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961300"
}
],
"notes": [
{
"category": "description",
"text": "A flaw use-after-free in the Linux kernel CIPSO network packet labeling protocol functionality was found in the way user open local network connection with the usage of the security labeling that is IP option number 134. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Considered to be Moderate rate, because by default CIPSO non-enabled and both no known way to reproduce the attack remotely and both it looks complex if even possible to use the attack in any way apart from crashing the system. For the usage of the inbound CIPSO connections, the administrator have to enable it with netlabelctl utility first. The vulnerability is considered to be for local user, because it can happen only when a local user opens a socket for sending packets, but not during receiving packets.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33033"
},
{
"category": "external",
"summary": "RHBZ#1961300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961300"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33033",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33033"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33033",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33033"
}
],
"release_date": "2021-03-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "The mitigation would be not allowing CIPSO labeling for the inbound network connections. For the most of the default configurations both for network routers and for the Linux servers itself it is disabled by default.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c"
},
{
"cve": "CVE-2021-33200",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-05-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965458"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in kernel/bpf/verifier.c in BPF in the Linux kernel. An incorrect limit is enforced for pointer arithmetic operations which can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33200"
},
{
"category": "external",
"summary": "RHBZ#1965458",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965458"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33200",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33200"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33200",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33200"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=3d0220f6861d713213b015b582e9f21e5b28d2e0",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=3d0220f6861d713213b015b582e9f21e5b28d2e0"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=a7036191277f9fa68d92f2071ddc38c09b1e5ee5",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=a7036191277f9fa68d92f2071ddc38c09b1e5ee5"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=bb01a1bba579b4b1c5566af24d95f1767859771e",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=bb01a1bba579b4b1c5566af24d95f1767859771e"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/05/27/1",
"url": "https://www.openwall.com/lists/oss-security/2021/05/27/1"
}
],
"release_date": "2021-05-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier"
},
{
"cve": "CVE-2021-46905",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-02-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2266253"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel. This flaw occurs due to an unconditional NULL-pointer dereference on every disconnect in the Linux kernel.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: NULL-deref on disconnect regression",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-46905"
},
{
"category": "external",
"summary": "RHBZ#2266253",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266253"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-46905",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46905"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-46905",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-46905"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024022557-CVE-2021-46905-6507@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024022557-CVE-2021-46905-6507@gregkh/T"
}
],
"release_date": "2024-02-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: NULL-deref on disconnect regression"
},
{
"cve": "CVE-2022-20166",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-08-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2122089"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s sysfs layer. This flaw allows a local user who can read files under the /sysfs mount point to corrupt memory or possibly crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: possible buffer overflow in sysfs reading",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-20166"
},
{
"category": "external",
"summary": "RHBZ#2122089",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122089"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-20166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20166"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-20166",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-20166"
}
],
"release_date": "2022-08-15T14:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: possible buffer overflow in sysfs reading"
}
]
}
rhsa-2021:4356
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n* kernel: out-of-bounds reads in pinctrl subsystem (CVE-2020-0427)\n* kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24502)\n* kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24503)\n* kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24504)\n* kernel: Fragmentation cache not cleared on reconnection (CVE-2020-24586)\n* kernel: Reassembling fragments encrypted under different keys (CVE-2020-24587)\n* kernel: wifi frame payload being parsed incorrectly as an L2 frame (CVE-2020-24588)\n* kernel: Forwarding EAPOL from unauthenticated wifi client (CVE-2020-26139)\n* kernel: accepting plaintext data frames in protected networks (CVE-2020-26140)\n* kernel: not verifying TKIP MIC of fragmented frames (CVE-2020-26141)\n* kernel: accepting fragmented plaintext frames in protected networks (CVE-2020-26143)\n* kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header (CVE-2020-26144)\n* kernel: accepting plaintext broadcast fragments as full frames (CVE-2020-26145)\n* kernel: powerpc: RTAS calls can be used to compromise kernel integrity (CVE-2020-27777)\n* kernel: locking inconsistency in tty_io.c and tty_jobctrl.c can lead to a read-after-free (CVE-2020-29660)\n* kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function via a long SSID value (CVE-2020-36158)\n* kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() (CVE-2020-36386)\n* kernel: Improper access control in BlueZ may allow information disclosure vulnerability. (CVE-2021-0129)\n* kernel: Use-after-free in ndb_queue_rq() in drivers/block/nbd.c (CVE-2021-3348)\n* kernel: Linux kernel eBPF RINGBUF map oversized allocation (CVE-2021-3489)\n* kernel: double free in bluetooth subsystem when the HCI device initialization fails (CVE-2021-3564)\n* kernel: use-after-free in function hci_sock_bound_ioctl() (CVE-2021-3573)\n* kernel: eBPF 32-bit source register truncation on div/mod (CVE-2021-3600)\n* kernel: DoS in rb_per_cpu_empty() (CVE-2021-3679)\n* kernel: Mounting overlayfs inside an unprivileged user namespace can reveal files (CVE-2021-3732)\n* kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt() (CVE-2021-20194)\n* kernel: Race condition in sctp_destroy_sock list_del (CVE-2021-23133)\n* kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode (CVE-2021-28950)\n* kernel: System crash in intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c (CVE-2021-28971)\n* kernel: protection can be bypassed to leak content of kernel memory (CVE-2021-29155)\n* kernel: improper input validation in tipc_nl_retrieve_key function in net/tipc/node.c (CVE-2021-29646)\n* kernel: lack a full memory barrier may lead to DoS (CVE-2021-29650)\n* kernel: local escalation of privileges in handling of eBPF programs (CVE-2021-31440)\n* kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory (CVE-2021-31829)\n* kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier (CVE-2021-33200)\n* kernel: reassembling encrypted fragments with non-consecutive packet numbers (CVE-2020-26146)\n* kernel: reassembling mixed encrypted/plaintext fragments (CVE-2020-26147)\n* kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check (CVE-2020-29368)\n* kernel: flowtable list del corruption with kernel BUG at lib/list_debug.c:50 (CVE-2021-3635)\n* kernel: NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c (CVE-2021-3659)\n* kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure (CVE-2021-20239)\n* kernel: out of bounds array access in drivers/md/dm-ioctl.c (CVE-2021-31916)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:4356",
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/"
},
{
"category": "external",
"summary": "1509204",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1509204"
},
{
"category": "external",
"summary": "1793880",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793880"
},
{
"category": "external",
"summary": "1816493",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816493"
},
{
"category": "external",
"summary": "1894101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894101"
},
{
"category": "external",
"summary": "1900844",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1900844"
},
{
"category": "external",
"summary": "1903244",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903244"
},
{
"category": "external",
"summary": "1906522",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906522"
},
{
"category": "external",
"summary": "1912683",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912683"
},
{
"category": "external",
"summary": "1913348",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913348"
},
{
"category": "external",
"summary": "1915825",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1915825"
},
{
"category": "external",
"summary": "1919893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919893"
},
{
"category": "external",
"summary": "1921958",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921958"
},
{
"category": "external",
"summary": "1923636",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1923636"
},
{
"category": "external",
"summary": "1930376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930376"
},
{
"category": "external",
"summary": "1930379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930379"
},
{
"category": "external",
"summary": "1930381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930381"
},
{
"category": "external",
"summary": "1933527",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1933527"
},
{
"category": "external",
"summary": "1939341",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1939341"
},
{
"category": "external",
"summary": "1941762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941762"
},
{
"category": "external",
"summary": "1941784",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941784"
},
{
"category": "external",
"summary": "1945345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945345"
},
{
"category": "external",
"summary": "1945388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945388"
},
{
"category": "external",
"summary": "1946965",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946965"
},
{
"category": "external",
"summary": "1948772",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1948772"
},
{
"category": "external",
"summary": "1951595",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951595"
},
{
"category": "external",
"summary": "1953847",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1953847"
},
{
"category": "external",
"summary": "1954588",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954588"
},
{
"category": "external",
"summary": "1957788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1957788"
},
{
"category": "external",
"summary": "1959559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959559"
},
{
"category": "external",
"summary": "1959642",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959642"
},
{
"category": "external",
"summary": "1959654",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959654"
},
{
"category": "external",
"summary": "1959657",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959657"
},
{
"category": "external",
"summary": "1959663",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959663"
},
{
"category": "external",
"summary": "1960490",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960490"
},
{
"category": "external",
"summary": "1960492",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960492"
},
{
"category": "external",
"summary": "1960496",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960496"
},
{
"category": "external",
"summary": "1960498",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960498"
},
{
"category": "external",
"summary": "1960500",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960500"
},
{
"category": "external",
"summary": "1960502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960502"
},
{
"category": "external",
"summary": "1960504",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960504"
},
{
"category": "external",
"summary": "1960708",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960708"
},
{
"category": "external",
"summary": "1964028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964028"
},
{
"category": "external",
"summary": "1964139",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964139"
},
{
"category": "external",
"summary": "1965038",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965038"
},
{
"category": "external",
"summary": "1965360",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965360"
},
{
"category": "external",
"summary": "1965458",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965458"
},
{
"category": "external",
"summary": "1966578",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966578"
},
{
"category": "external",
"summary": "1969489",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1969489"
},
{
"category": "external",
"summary": "1971101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971101"
},
{
"category": "external",
"summary": "1972278",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1972278"
},
{
"category": "external",
"summary": "1974627",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974627"
},
{
"category": "external",
"summary": "1975182",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975182"
},
{
"category": "external",
"summary": "1975949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975949"
},
{
"category": "external",
"summary": "1976679",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976679"
},
{
"category": "external",
"summary": "1976699",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976699"
},
{
"category": "external",
"summary": "1976946",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976946"
},
{
"category": "external",
"summary": "1976969",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976969"
},
{
"category": "external",
"summary": "1977162",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977162"
},
{
"category": "external",
"summary": "1977422",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977422"
},
{
"category": "external",
"summary": "1977537",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977537"
},
{
"category": "external",
"summary": "1977850",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977850"
},
{
"category": "external",
"summary": "1978369",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1978369"
},
{
"category": "external",
"summary": "1979070",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1979070"
},
{
"category": "external",
"summary": "1979680",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1979680"
},
{
"category": "external",
"summary": "1981954",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981954"
},
{
"category": "external",
"summary": "1986138",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986138"
},
{
"category": "external",
"summary": "1989165",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989165"
},
{
"category": "external",
"summary": "1989999",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989999"
},
{
"category": "external",
"summary": "1991976",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1991976"
},
{
"category": "external",
"summary": "1992700",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992700"
},
{
"category": "external",
"summary": "1995249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995249"
},
{
"category": "external",
"summary": "1996854",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1996854"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4356.json"
}
],
"title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2025-10-28T19:33:53+00:00",
"generator": {
"date": "2025-10-28T19:33:53+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.10"
}
},
"id": "RHSA-2021:4356",
"initial_release_date": "2021-11-09T18:06:54+00:00",
"revision_history": [
{
"date": "2021-11-09T18:06:54+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-11-09T18:06:54+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-28T19:33:53+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product": {
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-348.el8.aarch64",
"product": {
"name": "bpftool-0:4.18.0-348.el8.aarch64",
"product_id": "bpftool-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-core-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-debug-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-devel-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-headers-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-modules-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-tools-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-348.el8.aarch64",
"product": {
"name": "perf-0:4.18.0-348.el8.aarch64",
"product_id": "perf-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-348.el8.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-348.el8.aarch64",
"product_id": "python3-perf-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-348.el8.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-348.el8.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-348.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-348.el8?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-348.el8.ppc64le",
"product_id": "bpftool-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-core-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-debug-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-devel-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-headers-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-modules-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-tools-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "perf-0:4.18.0-348.el8.ppc64le",
"product_id": "perf-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-348.el8.ppc64le",
"product_id": "python3-perf-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-348.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-348.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-348.el8.x86_64",
"product": {
"name": "bpftool-0:4.18.0-348.el8.x86_64",
"product_id": "bpftool-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-core-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-debug-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-devel-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-headers-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-modules-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-tools-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-348.el8.x86_64",
"product": {
"name": "perf-0:4.18.0-348.el8.x86_64",
"product_id": "perf-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-348.el8.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-348.el8.x86_64",
"product_id": "python3-perf-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-348.el8.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-348.el8.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-348.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-348.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-348.el8.s390x",
"product": {
"name": "bpftool-0:4.18.0-348.el8.s390x",
"product_id": "bpftool-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-0:4.18.0-348.el8.s390x",
"product_id": "kernel-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-core-0:4.18.0-348.el8.s390x",
"product_id": "kernel-core-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-348.el8.s390x",
"product_id": "kernel-debug-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-348.el8.s390x",
"product_id": "kernel-debug-core-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-348.el8.s390x",
"product_id": "kernel-devel-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-348.el8.s390x",
"product_id": "kernel-headers-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-348.el8.s390x",
"product_id": "kernel-modules-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-348.el8.s390x",
"product_id": "kernel-tools-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-348.el8.s390x",
"product": {
"name": "perf-0:4.18.0-348.el8.s390x",
"product_id": "perf-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-348.el8.s390x",
"product": {
"name": "python3-perf-0:4.18.0-348.el8.s390x",
"product_id": "python3-perf-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-348.el8.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-348.el8.s390x",
"product_id": "perf-debuginfo-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-348.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-348.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-348.el8.src",
"product": {
"name": "kernel-0:4.18.0-348.el8.src",
"product_id": "kernel-0:4.18.0-348.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-348.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"product": {
"name": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"product_id": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-stablelists@4.18.0-348.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-348.el8.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-348.el8.noarch",
"product_id": "kernel-doc-0:4.18.0-348.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-348.el8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64"
},
"product_reference": "bpftool-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x"
},
"product_reference": "bpftool-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64"
},
"product_reference": "bpftool-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src"
},
"product_reference": "kernel-0:4.18.0-348.el8.src",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-core-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-348.el8.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-348.el8.noarch",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64"
},
"product_reference": "perf-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "perf-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x"
},
"product_reference": "perf-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64"
},
"product_reference": "perf-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x"
},
"product_reference": "python3-perf-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64"
},
"product_reference": "bpftool-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x"
},
"product_reference": "bpftool-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64"
},
"product_reference": "bpftool-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.el8.src as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src"
},
"product_reference": "kernel-0:4.18.0-348.el8.src",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-core-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-348.el8.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-348.el8.noarch",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64"
},
"product_reference": "perf-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "perf-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x"
},
"product_reference": "perf-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64"
},
"product_reference": "perf-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x"
},
"product_reference": "python3-perf-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"relates_to_product_reference": "CRB-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"relates_to_product_reference": "CRB-8.5.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-14615",
"cwe": {
"id": "CWE-212",
"name": "Improper Removal of Sensitive Information Before Storage or Transfer"
},
"discovery_date": "2020-01-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1789209"
}
],
"notes": [
{
"category": "description",
"text": "An information disclosure flaw was found in the Linux kernel. The i915 graphics driver lacks control of flow for data structures which may allow a local, authenticated user to disclose information when using ioctl commands with an attached i915 device. The highest threat from this vulnerability is to data confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Intel graphics card information leak.",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, 8 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 6, 7, and 8 may address this issue.\n\nThis has been rated as having Moderate security impact and is not currently planned to be addressed in future updates of Red Hat Enterprise MRG 2.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-14615"
},
{
"category": "external",
"summary": "RHBZ#1789209",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789209"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-14615",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14615"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14615",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14615"
}
],
"release_date": "2020-01-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Preventing loading of the i915 kernel module will prevent attackers from using this exploit against the system; however, the power management functionality of the card will be disabled and the system may draw additional power. See the kcs \u201cHow do I blacklist a kernel module to prevent it from loading automatically?\u201c (https://access.redhat.com/solutions/41278) for instructions on how to disable a kernel module from autoloading. Graphical displays may also be at low resolution or not work correctly.\n\nThis mitigation may not be suitable if the graphical login functionality is required.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Intel graphics card information leak."
},
{
"cve": "CVE-2019-15794",
"cwe": {
"id": "CWE-672",
"name": "Operation on a Resource after Expiration or Release"
},
"discovery_date": "2020-05-04T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1831055"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. In Overlayfs, vma-\u003evm_file was replaced in the mmap handlers and, on errors, the original value is not restored. A local attacker with special user privilege (or root) can cause a kernel internal information leak. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Overlayfs in the Linux kernel and shiftfs not restoring original value on error leading to a refcount underflow",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-15794"
},
{
"category": "external",
"summary": "RHBZ#1831055",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831055"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-15794",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15794"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15794",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15794"
}
],
"release_date": "2019-11-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Overlayfs in the Linux kernel and shiftfs not restoring original value on error leading to a refcount underflow"
},
{
"cve": "CVE-2020-0427",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-01-24T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1919893"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux pinctrl system. It is possible to trigger an of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds reads in pinctrl subsystem.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-0427"
},
{
"category": "external",
"summary": "RHBZ#1919893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919893"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-0427",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0427"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0427",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0427"
}
],
"release_date": "2020-11-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: out-of-bounds reads in pinctrl subsystem."
},
{
"cve": "CVE-2020-24502",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-02-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1930379"
}
],
"notes": [
{
"category": "description",
"text": "Improper input validation in some Intel(R) Ethernet E810 Adapter drivers for Linux may allow an authenticated user to potentially enable a denial of service via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24502"
},
{
"category": "external",
"summary": "RHBZ#1930379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930379"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24502",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24502"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24502",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24502"
}
],
"release_date": "2021-02-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers"
},
{
"cve": "CVE-2020-24503",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-02-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1930381"
}
],
"notes": [
{
"category": "description",
"text": "Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers for Linux may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24503"
},
{
"category": "external",
"summary": "RHBZ#1930381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930381"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24503",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24503"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24503",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24503"
}
],
"release_date": "2021-02-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers"
},
{
"cve": "CVE-2020-24504",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-02-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1930376"
}
],
"notes": [
{
"category": "description",
"text": "An uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers for Linux may allow an authenticated user to potentially cause a denial of service via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24504"
},
{
"category": "external",
"summary": "RHBZ#1930376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930376"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24504",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24504"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24504",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24504"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html"
}
],
"release_date": "2021-02-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers"
},
{
"cve": "CVE-2020-24586",
"cwe": {
"id": "CWE-212",
"name": "Improper Removal of Sensitive Information Before Storage or Transfer"
},
"discovery_date": "2021-05-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1959642"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernels implementation of wifi fragmentation handling. An attacker with the ability to transmit within the wireless transmission range of an access point can abuse a flaw where previous contents of wifi fragments can be unintentionally transmitted to another device.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Fragmentation cache not cleared on reconnection",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "RHBZ#1959642",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959642"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24586"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/"
}
],
"release_date": "2021-05-12T01:20:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Fragmentation cache not cleared on reconnection"
},
{
"cve": "CVE-2020-24587",
"cwe": {
"id": "CWE-345",
"name": "Insufficient Verification of Data Authenticity"
},
"discovery_date": "2021-05-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1959654"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u0027s WiFi implementation. An attacker within the wireless range can abuse a logic flaw in the WiFi implementation by reassembling packets from multiple fragments under different keys, treating them as valid. This flaw allows an attacker to send a fragment under an incorrect key, treating them as a valid fragment under the new key. The highest threat from this vulnerability is to confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Reassembling fragments encrypted under different keys",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "RHBZ#1959654",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959654"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24587",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24587"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24587",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24587"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/"
}
],
"release_date": "2021-05-11T14:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.1,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Reassembling fragments encrypted under different keys"
},
{
"cve": "CVE-2020-24588",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-05-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1959657"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernels wifi implementation. An attacker within wireless broadcast range can inject custom data into the wireless communication circumventing checks on the data. This can cause the frame to pass checks and be considered a valid frame of a different type.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: wifi frame payload being parsed incorrectly as an L2 frame",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "RHBZ#1959657",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959657"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24588",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24588"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24588",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24588"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.25d93176ddaf.I9e265b597f2cd23eb44573f35b625947b386a9de@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.25d93176ddaf.I9e265b597f2cd23eb44573f35b625947b386a9de@changeid/"
}
],
"release_date": "2021-05-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: wifi frame payload being parsed incorrectly as an L2 frame"
},
{
"cve": "CVE-2020-26139",
"cwe": {
"id": "CWE-829",
"name": "Inclusion of Functionality from Untrusted Control Sphere"
},
"discovery_date": "2021-05-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1959663"
}
],
"notes": [
{
"category": "description",
"text": "Frames used for authentication and key management between the AP and connected clients. Some clients may take these redirected frames masquerading as control mechanisms from the AP.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Forwarding EAPOL from unauthenticated wifi client",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26139"
},
{
"category": "external",
"summary": "RHBZ#1959663",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959663"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26139"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26139",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26139"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.cb327ed0cabe.Ib7dcffa2a31f0913d660de65ba3c8aca75b1d10f@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.cb327ed0cabe.Ib7dcffa2a31f0913d660de65ba3c8aca75b1d10f@changeid/"
}
],
"release_date": "2021-05-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Forwarding EAPOL from unauthenticated wifi client"
},
{
"cve": "CVE-2020-26140",
"cwe": {
"id": "CWE-346",
"name": "Origin Validation Error"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960490"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Linux kernel. Where the WiFi implementations accept plaintext frames in a protected WiFi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: accepting plaintext data frames in protected networks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26140"
},
{
"category": "external",
"summary": "RHBZ#1960490",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960490"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26140",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26140"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26140",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26140"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: accepting plaintext data frames in protected networks"
},
{
"cve": "CVE-2020-26141",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960492"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Linux kernel\u0027s WiFi implementation. An attacker within wireless range can inject a control packet fragment where the kernel does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: not verifying TKIP MIC of fragmented frames",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "RHBZ#1960492",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960492"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26141"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26141",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26141"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.c3f1d42c6746.I795593fcaae941c471425b8c7d5f7bb185d29142@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.c3f1d42c6746.I795593fcaae941c471425b8c7d5f7bb185d29142@changeid/"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: not verifying TKIP MIC of fragmented frames"
},
{
"cve": "CVE-2020-26143",
"cwe": {
"id": "CWE-346",
"name": "Origin Validation Error"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960496"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Linux kernel, where the WiFi implementations assemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: accepting fragmented plaintext frames in protected networks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26143"
},
{
"category": "external",
"summary": "RHBZ#1960496",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960496"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26143",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26143"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26143",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26143"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: accepting fragmented plaintext frames in protected networks"
},
{
"cve": "CVE-2020-26144",
"cwe": {
"id": "CWE-290",
"name": "Authentication Bypass by Spoofing"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960498"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel, where the WiFi implementations accept plaintext A-MSDU frames as long as the first 8 bytes correspond to a valid RFC1042 (ex., LLC/SNAP) header for EAPOL. The highest threat from this vulnerability is to integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26144"
},
{
"category": "external",
"summary": "RHBZ#1960498",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960498"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26144",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26144"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26144",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26144"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header"
},
{
"cve": "CVE-2020-26145",
"cwe": {
"id": "CWE-307",
"name": "Improper Restriction of Excessive Authentication Attempts"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960500"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in ath10k_htt_rx_proc_rx_frag_ind_hl in drivers/net/wireless/ath/ath10k/htt_rx.c in the Linux kernel WiFi implementations, where it accepts a second (or subsequent) broadcast fragments even when sent in plaintext and then process them as full unfragmented frames. The highest threat from this vulnerability is to integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: accepting plaintext broadcast fragments as full frames",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26145"
},
{
"category": "external",
"summary": "RHBZ#1960500",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960500"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26145"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26145",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26145"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.9ca6ca7945a9.I1e18b514590af17c155bda86699bc3a971a8dcf4@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.9ca6ca7945a9.I1e18b514590af17c155bda86699bc3a971a8dcf4@changeid/"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: accepting plaintext broadcast fragments as full frames"
},
{
"cve": "CVE-2020-26146",
"cwe": {
"id": "CWE-307",
"name": "Improper Restriction of Excessive Authentication Attempts"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960502"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Linux kernel, where the WiFi implementation reassemble fragments with non-consecutive packet numbers. An adversary can abuse this to exfiltrate selected fragments. This vulnerability is exploitable when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used. Note that WEP is vulnerable to this attack by design.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: reassembling encrypted fragments with non-consecutive packet numbers",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26146"
},
{
"category": "external",
"summary": "RHBZ#1960502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960502"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26146"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26146",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26146"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: reassembling encrypted fragments with non-consecutive packet numbers"
},
{
"cve": "CVE-2020-26147",
"cwe": {
"id": "CWE-307",
"name": "Improper Restriction of Excessive Authentication Attempts"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960504"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in ieee80211_rx_h_defragment in net/mac80211/rx.c in the Linux Kernel\u0027s WiFi implementation. This vulnerability can be abused to inject packets or exfiltrate selected fragments when another device sends fragmented frames, and the WEP, CCMP, or GCMP data-confidentiality protocol is used. The highest threat from this vulnerability is to integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: reassembling mixed encrypted/plaintext fragments",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26147"
},
{
"category": "external",
"summary": "RHBZ#1960504",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960504"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26147",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26147"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.30c4394bb835.I5acfdb552cc1d20c339c262315950b3eac491397@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.30c4394bb835.I5acfdb552cc1d20c339c262315950b3eac491397@changeid/"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: reassembling mixed encrypted/plaintext fragments"
},
{
"acknowledgments": [
{
"names": [
"Daniel Axtens"
],
"organization": "IBM"
}
],
"cve": "CVE-2020-27777",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"discovery_date": "2020-10-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1900844"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: powerpc: RTAS calls can be used to compromise kernel integrity",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having Moderate impact due to the required privileges and hardware dependencies.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-27777"
},
{
"category": "external",
"summary": "RHBZ#1900844",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1900844"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-27777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27777"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27777",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27777"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?h=next\u0026id=bd59380c5ba4147dcbaad3e582b55ccfd120b764",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?h=next\u0026id=bd59380c5ba4147dcbaad3e582b55ccfd120b764"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2020/10/09/1",
"url": "https://www.openwall.com/lists/oss-security/2020/10/09/1"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2020/11/23/2",
"url": "https://www.openwall.com/lists/oss-security/2020/11/23/2"
}
],
"release_date": "2020-10-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: powerpc: RTAS calls can be used to compromise kernel integrity"
},
{
"cve": "CVE-2020-29368",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-12-01T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903244"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw has been rated as having Moderateimpact because, based on Red Hat\u0027s assessment, this issue is hard to exploit in practice because the race window is too small for it to be reliable.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-29368"
},
{
"category": "external",
"summary": "RHBZ#1903244",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903244"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-29368",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29368"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29368",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29368"
}
],
"release_date": "2020-06-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check"
},
{
"cve": "CVE-2020-29660",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2020-12-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1906522"
}
],
"notes": [
{
"category": "description",
"text": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel. A local user could use this flaw to read numerical value from memory after free.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: locking inconsistency in drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c can lead to a read-after-free",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having Low impact (Red Hat Enterprise Linux 7) because of the need to have CAP_SYS_TTY_CONFIG privileges.\n\nThis flaw is rated as having Moderate (Red Hat Enterprise Linux 8) impact because of the need to have CAP_SYS_TTY_CONFIG privileges. Red Hat Enterprise Linux 8 enabled unprivileged user/network namespaces by default which can be used to exercise this vulnerability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-29660"
},
{
"category": "external",
"summary": "RHBZ#1906522",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906522"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-29660",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29660"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29660",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29660"
}
],
"release_date": "2020-12-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: locking inconsistency in drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c can lead to a read-after-free"
},
{
"cve": "CVE-2020-36158",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2021-01-05T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1913348"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. The marvell wifi driver could allow a local attacker to execute arbitrary code via a long SSID value in mwifiex_cmd_802_11_ad_hoc_start function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function in drivers/net/wireless/marvell/mwifiex/join.c via a long SSID value",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having Moderate impact because the attacker needs to be local and privileged enough to be able to initiate ad-hoc WIFI network creation.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36158"
},
{
"category": "external",
"summary": "RHBZ#1913348",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913348"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36158",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36158"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36158",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36158"
}
],
"release_date": "2020-12-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module mwifiex from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function in drivers/net/wireless/marvell/mwifiex/join.c via a long SSID value"
},
{
"cve": "CVE-2020-36312",
"cwe": {
"id": "CWE-772",
"name": "Missing Release of Resource after Effective Lifetime"
},
"discovery_date": "2021-04-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1947991"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the KVM hypervisor of the Linux kernel. A memory leak could occur in kvm_io_bus_unregister_dev() upon a kmalloc failure. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: memory leak upon a kmalloc failure in kvm_io_bus_unregister_dev function in virt/kvm/kvm_main.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36312"
},
{
"category": "external",
"summary": "RHBZ#1947991",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1947991"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36312",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36312"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36312",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36312"
}
],
"release_date": "2020-09-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: memory leak upon a kmalloc failure in kvm_io_bus_unregister_dev function in virt/kvm/kvm_main.c"
},
{
"cve": "CVE-2020-36386",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2021-06-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1969489"
}
],
"notes": [
{
"category": "description",
"text": "A flaw out of bounds memory access in the Linux kernel bluetooth subsystem was found in the way when some data being read about the bluetooth device with the hci_extended_inquiry_result_evt call. A local user could use this flaw to crash the system or read some data out of memory bounds that can lead to data confidentiality threat.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() in net/bluetooth/hci_event.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having a Moderate impact because even the data being read out of memory bounds is written to some cache, it was known before that this data from non-safe source and as result no any sensitive dependencies on this data.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36386"
},
{
"category": "external",
"summary": "RHBZ#1969489",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1969489"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36386",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36386"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36386",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36386"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51c19bf3d5cfaa66571e4b88ba2a6f6295311101",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51c19bf3d5cfaa66571e4b88ba2a6f6295311101"
}
],
"release_date": "2020-07-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module bluetooth from being loaded (if Bluetooth not required for the system). Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() in net/bluetooth/hci_event.c"
},
{
"cve": "CVE-2021-0129",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965038"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access. The highest threat from this vulnerability is to data confidentiality and integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper access control in BlueZ may allow information disclosure vulnerability.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0129"
},
{
"category": "external",
"summary": "RHBZ#1965038",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965038"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0129"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0129",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0129"
}
],
"release_date": "2021-06-08T03:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Improper access control in BlueZ may allow information disclosure vulnerability."
},
{
"cve": "CVE-2021-3348",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-01-28T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1921958"
}
],
"notes": [
{
"category": "description",
"text": "A use after free flaw in the Linux kernel network block device (NBD) subsystem was found in the way user calls an ioctl NBD_SET_SOCK at a certain point during device setup.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use-after-free in ndb_queue_rq() in drivers/block/nbd.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having a Moderate impact because in the default configuration, the issue can only be triggered by a privileged local user (with access to the nbd device).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3348"
},
{
"category": "external",
"summary": "RHBZ#1921958",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921958"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3348",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3348"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3348",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3348"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-block/24dff677353e2e30a71d8b66c4dffdbdf77c4dbd.1611595239.git.josef@toxicpanda.com/",
"url": "https://lore.kernel.org/linux-block/24dff677353e2e30a71d8b66c4dffdbdf77c4dbd.1611595239.git.josef@toxicpanda.com/"
}
],
"release_date": "2021-01-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module nbd from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Use-after-free in ndb_queue_rq() in drivers/block/nbd.c"
},
{
"cve": "CVE-2021-3444",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-03-23T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1942667"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds access flaw was found in the Linux kernel\u0027s implementation of the eBPF code verifier in the way a user running the eBPF script uses mod32 destination register truncation when the source register was known to be 0. This flaw allows a local user to crash the system or possibly escalate their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: bpf verifier incorrect mod32 truncation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having Moderate impact because of the need to have elevated privileges or non-standard configuration for running BPF script.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3444"
},
{
"category": "external",
"summary": "RHBZ#1942667",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1942667"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3444",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3444"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3444",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3444"
}
],
"release_date": "2021-02-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: bpf verifier incorrect mod32 truncation"
},
{
"acknowledgments": [
{
"names": [
"Ryota Shiga"
]
}
],
"cve": "CVE-2021-3489",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1959559"
}
],
"notes": [
{
"category": "description",
"text": "A flaw out of bound memory write in the Linux kernel BPF subsystem was found in the way user writes to BPF ring buffer too fast, so larger buffer than available memory could be allocated. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Linux kernel eBPF RINGBUF map oversized allocation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3489"
},
{
"category": "external",
"summary": "RHBZ#1959559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959559"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3489",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3489"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3489",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3489"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=4b81ccebaeee885ab1aa1438133f2991e3a2b6ea",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=4b81ccebaeee885ab1aa1438133f2991e3a2b6ea"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/05/11/10",
"url": "https://www.openwall.com/lists/oss-security/2021/05/11/10"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Linux kernel eBPF RINGBUF map oversized allocation"
},
{
"acknowledgments": [
{
"names": [
"HaoXiong, LinMa"
],
"organization": "ckSec"
}
],
"cve": "CVE-2021-3564",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"discovery_date": "2021-05-19T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1964139"
}
],
"notes": [
{
"category": "description",
"text": "A flaw double-free memory corruption in the Linux kernel HCI device initialization subsystem was found in the way user attach malicious HCI TTY Bluetooth device. A local user could use this flaw to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: double free in bluetooth subsystem when the HCI device initialization fails",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The impact is Moderate, because the double free happens during flush procedure, and no use of incorrect data during flush finishing even if double free could happen without kernel crash.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3564"
},
{
"category": "external",
"summary": "RHBZ#1964139",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964139"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3564"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3564",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3564"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/05/25/1",
"url": "https://www.openwall.com/lists/oss-security/2021/05/25/1"
}
],
"release_date": "2021-05-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: double free in bluetooth subsystem when the HCI device initialization fails"
},
{
"cve": "CVE-2021-3573",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-31T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1966578"
}
],
"notes": [
{
"category": "description",
"text": "A flaw use-after-free in function hci_sock_bound_ioctl() of the Linux kernel HCI subsystem was found in the way user calls ioct HCIUNBLOCKADDR or other way triggers race condition of the call hci_unregister_dev() together with one of the calls hci_sock_blacklist_add(), hci_sock_blacklist_del(), hci_get_conn_info(), hci_get_auth_info(). A privileged local user could use this flaw to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in function hci_sock_bound_ioctl()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having a Moderate impact because of the privileges (CAP_NET_ADMIN in initial namespace) required for exploiting the issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3573"
},
{
"category": "external",
"summary": "RHBZ#1966578",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966578"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3573",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3573"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth.git/commit/?id=e305509e678b3a4af2b3cfd410f409f7cdaabb52",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth.git/commit/?id=e305509e678b3a4af2b3cfd410f409f7cdaabb52"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/06/08/2",
"url": "https://www.openwall.com/lists/oss-security/2021/06/08/2"
}
],
"release_date": "2021-06-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising easThe required privileges is CAP_NET_ADMIN capabilities. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.e of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in function hci_sock_bound_ioctl()"
},
{
"cve": "CVE-2021-3600",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-23T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1981954"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s eBPF verification code, where the eBPF 32-bit div/mod source register truncation could lead to out-of-bounds reads and writes. By default, accessing the eBPF verifier is only possible to privileged users with CAP_SYS_ADMIN. This flaw allows a local user who can run eBPF instructions to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: eBPF 32-bit source register truncation on div/mod",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3600"
},
{
"category": "external",
"summary": "RHBZ#1981954",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981954"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3600"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3600",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3600"
},
{
"category": "external",
"summary": "https://lore.kernel.org/patchwork/patch/1379497/",
"url": "https://lore.kernel.org/patchwork/patch/1379497/"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/06/23/1",
"url": "https://www.openwall.com/lists/oss-security/2021/06/23/1"
}
],
"release_date": "2021-06-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: eBPF 32-bit source register truncation on div/mod"
},
{
"cve": "CVE-2021-3635",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-06-22T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1976946"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel netfilter implementation. A user with root (CAP_SYS_ADMIN) access is able to panic the system when issuing netfilter netflow commands",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: flowtable list del corruption with kernel BUG at lib/list_debug.c:50",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3635"
},
{
"category": "external",
"summary": "RHBZ#1976946",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976946"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3635",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3635"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3635",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3635"
}
],
"release_date": "2021-08-06T04:47:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: flowtable list del corruption with kernel BUG at lib/list_debug.c:50"
},
{
"cve": "CVE-2021-3659",
"cwe": {
"id": "CWE-252",
"name": "Unchecked Return Value"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1975949"
}
],
"notes": [
{
"category": "description",
"text": "A NULL pointer dereference flaw was found in the Linux kernel\u2019s IEEE 802.15.4 wireless networking subsystem in the way the user closes the LR-WPAN connection. This flaw allows a local user to crash the system. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3659"
},
{
"category": "external",
"summary": "RHBZ#1975949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975949"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3659",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3659"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3659",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3659"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8"
}
],
"release_date": "2021-04-06T19:22:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module mac802154 from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c"
},
{
"acknowledgments": [
{
"names": [
"Haoran Luo"
],
"organization": "Chaitin Tech"
}
],
"cve": "CVE-2021-3679",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-07-25T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1989165"
}
],
"notes": [
{
"category": "description",
"text": "A lack of CPU resources in the Linux kernel tracing module functionality was found in the way users use the trace ring buffer in specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: DoS in rb_per_cpu_empty()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3679"
},
{
"category": "external",
"summary": "RHBZ#1989165",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989165"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3679",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3679"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3679",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3679"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20210723125527.767d1c18@oasis.local.home/",
"url": "https://lore.kernel.org/lkml/20210723125527.767d1c18@oasis.local.home/"
}
],
"release_date": "2021-07-20T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: DoS in rb_per_cpu_empty()"
},
{
"acknowledgments": [
{
"names": [
"Miklos Szeredi"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2021-3732",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-08-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1995249"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s OverlayFS subsystem in the way the user mounts the TmpFS filesystem with OverlayFS. This flaw allows a local user to gain access to hidden files that should not be accessible.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: overlayfs: Mounting overlayfs inside an unprivileged user namespace can reveal files",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3732"
},
{
"category": "external",
"summary": "RHBZ#1995249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995249"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3732",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3732"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3732",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3732"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=427215d85e8d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=427215d85e8d"
}
],
"release_date": "2021-08-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: overlayfs: Mounting overlayfs inside an unprivileged user namespace can reveal files"
},
{
"cve": "CVE-2021-4442",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-08-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2308455"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: add sanity tests to TCP_QUEUE_SEQ\n\nQingyu Li reported a syzkaller bug where the repro\nchanges RCV SEQ _after_ restoring data in the receive queue.\n\nmprotect(0x4aa000, 12288, PROT_READ) = 0\nmmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000\nmmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000\nmmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000\nsocket(AF_INET6, SOCK_STREAM, IPPROTO_IP) = 3\nsetsockopt(3, SOL_TCP, TCP_REPAIR, [1], 4) = 0\nconnect(3, {sa_family=AF_INET6, sin6_port=htons(0), sin6_flowinfo=htonl(0), inet_pton(AF_INET6, \"::1\", \u0026sin6_addr), sin6_scope_id=0}, 28) = 0\nsetsockopt(3, SOL_TCP, TCP_REPAIR_QUEUE, [1], 4) = 0\nsendmsg(3, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base=\"0x0000000000000003\\0\\0\", iov_len=20}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, 0) = 20\nsetsockopt(3, SOL_TCP, TCP_REPAIR, [0], 4) = 0\nsetsockopt(3, SOL_TCP, TCP_QUEUE_SEQ, [128], 4) = 0\nrecvfrom(3, NULL, 20, 0, NULL, NULL) = -1 ECONNRESET (Connection reset by peer)\n\nsyslog shows:\n[ 111.205099] TCP recvmsg seq # bug 2: copied 80, seq 0, rcvnxt 80, fl 0\n[ 111.207894] WARNING: CPU: 1 PID: 356 at net/ipv4/tcp.c:2343 tcp_recvmsg_locked+0x90e/0x29a0\n\nThis should not be allowed. TCP_QUEUE_SEQ should only be used\nwhen queues are empty.\n\nThis patch fixes this case, and the tx path as well.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: add sanity tests to TCP_QUEUE_SEQ",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is fixed in RHEL-8.5 and above\n~~~\nin (rhel-8.5, rhel-8.6, rhel-8.7, rhel-8.8, rhel-8.9, rhel-8.10) tcp: add sanity tests to TCP_QUEUE_SEQ\n~~~",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4442"
},
{
"category": "external",
"summary": "RHBZ#2308455",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2308455"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4442",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4442"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4442",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4442"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024082945-CVE-2021-4442-0a5f@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024082945-CVE-2021-4442-0a5f@gregkh/T"
}
],
"release_date": "2024-08-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: add sanity tests to TCP_QUEUE_SEQ"
},
{
"acknowledgments": [
{
"names": [
"Loris Reiff"
]
}
],
"cve": "CVE-2021-20194",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2020-12-30T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1912683"
}
],
"notes": [
{
"category": "description",
"text": "A flaw buffer overflow in the Linux kernel BPF subsystem was found in the way user running BPF script calling getsockopt. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having Moderate impact because of the need to have elevated privileges or non-standard configuration for running BPF script.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-20194"
},
{
"category": "external",
"summary": "RHBZ#1912683",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912683"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-20194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20194"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20194",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20194"
}
],
"release_date": "2021-01-22T10:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\n\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt()"
},
{
"cve": "CVE-2021-20239",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-02-01T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1923636"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the BPF protocol. This flaw allows an attacker with a local account to leak information about kernel internal addresses. The highest threat from this vulnerability is to confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-20239"
},
{
"category": "external",
"summary": "RHBZ#1923636",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1923636"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-20239",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20239"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20239",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20239"
}
],
"release_date": "2021-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Loading a filter is a privileged (CAP_SYS_ADMIN or root) operation. Once any filter is used, this attack is capable of being used by an unprivileged user. There is no known mitigation that product security finds suitable for this flaw.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.8,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure"
},
{
"acknowledgments": [
{
"names": [
"Or Cohen"
],
"organization": "Palo Alto Networks"
}
],
"cve": "CVE-2021-23133",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-04-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1948772"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s SCTP socket functionality that triggers a race condition. This flaw allows a local user to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Race condition in sctp_destroy_sock list_del",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having a Moderate impact because of the privileges required for running the known reproducer. The required privileges are CAP_BPF and CAP_NET_ADMIN capabilities that are disabled by default in Red Hat Enterprise Linux 7. For Red Hat Enterprise Linux 8, the SCTP protocol itself is disabled by default and cannot be used by a user without enablement by an administrator.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-23133"
},
{
"category": "external",
"summary": "RHBZ#1948772",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1948772"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23133"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23133",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23133"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b"
}
],
"release_date": "2021-04-18T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module sctp from being loaded (and this is so by default for Red Hat Enterprise Linux 8). Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Race condition in sctp_destroy_sock list_del"
},
{
"cve": "CVE-2021-28950",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2021-03-22T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1941762"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service in the kernel side of the FUSE functionality can allow a local system to create a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-28950"
},
{
"category": "external",
"summary": "RHBZ#1941762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941762"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-28950",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28950"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-28950",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-28950"
}
],
"release_date": "2021-03-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "As the FUSE module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install fuse /bin/true\" \u003e\u003e /etc/modprobe.d/disable-fuse.conf\n\nThe system will need to be restarted if the FUSE modules are loaded. In most circumstances, the CIFS kernel modules will be unable to be unloaded while the FUSE filesystems are in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode"
},
{
"cve": "CVE-2021-28971",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2021-03-22T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1941784"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. On some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: System crash in intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-28971"
},
{
"category": "external",
"summary": "RHBZ#1941784",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941784"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-28971",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28971"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-28971",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-28971"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: System crash in intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c"
},
{
"cve": "CVE-2021-29155",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2021-04-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1951595"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was discovered in retrieve_ptr_limit in kernel/bpf/verifier.c in the Linux kernel mechanism to mitigate speculatively out-of-bounds loads (Spectre mitigation). In this flaw a local, special user privileged (CAP_SYS_ADMIN) BPF program running on affected systems may bypass the protection, and execute speculatively out-of-bounds loads from the kernel memory. This can be abused to extract contents of kernel memory via side-channel.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: protection for sequences of pointer arithmetic operations against speculatively out-of-bounds loads can be bypassed to leak content of kernel memory",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29155"
},
{
"category": "external",
"summary": "RHBZ#1951595",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951595"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29155"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29155",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29155"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/04/18/4",
"url": "https://www.openwall.com/lists/oss-security/2021/04/18/4"
}
],
"release_date": "2021-04-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: protection for sequences of pointer arithmetic operations against speculatively out-of-bounds loads can be bypassed to leak content of kernel memory"
},
{
"cve": "CVE-2021-29646",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-03-30T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1945345"
}
],
"notes": [
{
"category": "description",
"text": "A flaw buffer overflow in the Linux kernel TIPC protocol functionality was found in the way user uses protocol with encryption enabled. A local user could use this flaw to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: improper input validation in tipc_nl_retrieve_key function in net/tipc/node.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29646"
},
{
"category": "external",
"summary": "RHBZ#1945345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945345"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29646",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29646"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29646",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29646"
}
],
"release_date": "2021-03-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: improper input validation in tipc_nl_retrieve_key function in net/tipc/node.c"
},
{
"cve": "CVE-2021-29650",
"cwe": {
"id": "CWE-662",
"name": "Improper Synchronization"
},
"discovery_date": "2021-03-30T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1945388"
}
],
"notes": [
{
"category": "description",
"text": "A denial-of-service (DoS) flaw was identified in the Linux kernel due to an incorrect memory barrier in xt_replace_table in net/netfilter/x_tables.c in the netfilter subsystem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29650"
},
{
"category": "external",
"summary": "RHBZ#1945388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945388"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29650",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29650"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1"
}
],
"release_date": "2021-03-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS"
},
{
"cve": "CVE-2021-29657",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"discovery_date": "2021-08-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1995153"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. A KVM guest on AMD can launch a nested guest without the Intercept VMRUN control bit by exploiting a TOCTOU vulnerability in nested_svm_vmrun. A malicious guest could use this flaw to gain unrestricted access to host MSRs, possibly leading to guest-to-host escape scenario.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: KVM: double fetch in nested_svm_vmrun can lead to unrestricted MSR access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The nested virtualization feature is not enabled by default up to Red Hat Enterprise Linux 8.4. Most importantly, Red Hat currently provides nested virtualization only as a Technology Preview, and is therefore unsupported for production use. For additional details please see https://access.redhat.com/solutions/21101 and https://access.redhat.com/support/offerings/techpreview.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29657"
},
{
"category": "external",
"summary": "RHBZ#1995153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995153"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29657",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29657"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29657",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29657"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2177",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2177"
}
],
"release_date": "2021-03-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "This vulnerability can be mitigated by disabling the nested virtualization feature:\n```\n# modprobe -r kvm_amd\n# modprobe kvm_amd nested=0\n```",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: KVM: double fetch in nested_svm_vmrun can lead to unrestricted MSR access"
},
{
"acknowledgments": [
{
"names": [
"Manfred Paul"
],
"organization": "RedRocket CTF team"
}
],
"cve": "CVE-2021-31440",
"cwe": {
"id": "CWE-682",
"name": "Incorrect Calculation"
},
"discovery_date": "2021-05-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1964028"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds access flaw was found in the Linux kernel\u2019s implementation of the eBPF code verifier, where an incorrect register bounds calculation while checking unsigned 32-bit instructions in an eBPF program occurs.. By default accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN. The issue results from the lack of proper validation of user-supplied eBPF programs prior to executing them. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: local escalation of privileges in handling of eBPF programs",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-31440"
},
{
"category": "external",
"summary": "RHBZ#1964028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964028"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-31440",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31440"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31440",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31440"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=10bf4e83167cc68595b85fd73bb91e8f2c086e36",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=10bf4e83167cc68595b85fd73bb91e8f2c086e36"
},
{
"category": "external",
"summary": "https://www.zerodayinitiative.com/blog/2021/5/26/cve-2021-31440-an-incorrect-bounds-calculation-in-the-linux-kernel-ebpf-verifier",
"url": "https://www.zerodayinitiative.com/blog/2021/5/26/cve-2021-31440-an-incorrect-bounds-calculation-in-the-linux-kernel-ebpf-verifier"
}
],
"release_date": "2021-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: local escalation of privileges in handling of eBPF programs"
},
{
"cve": "CVE-2021-31829",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-05-04T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1957788"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u0027s eBPF verification code. By default, accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN. This flaw allows a local user who can insert eBPF instructions, to use the eBPF verifier to abuse a spectre-like flaw and infer all system memory. The highest threat from this vulnerability is to confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-31829"
},
{
"category": "external",
"summary": "RHBZ#1957788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1957788"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-31829",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31829"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31829",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31829"
}
],
"release_date": "2021-04-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 and 8 kernel to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory"
},
{
"cve": "CVE-2021-31916",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-03-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1946965"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel. A bound check failure allows an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash, a leak of internal kernel information, or a privilege escalation problem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out of bounds array access in drivers/md/dm-ioctl.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated a Low impact because in the default configuration, the issue can only be triggered by a privileged local user.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-31916"
},
{
"category": "external",
"summary": "RHBZ#1946965",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946965"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-31916",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31916"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31916",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31916"
},
{
"category": "external",
"summary": "https://github.com/torvalds/linux/commit/4edbe1d7bcffcd6269f3b5eb63f710393ff2ec7a",
"url": "https://github.com/torvalds/linux/commit/4edbe1d7bcffcd6269f3b5eb63f710393ff2ec7a"
},
{
"category": "external",
"summary": "https://seclists.org/oss-sec/2021/q1/268",
"url": "https://seclists.org/oss-sec/2021/q1/268"
}
],
"release_date": "2021-03-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: out of bounds array access in drivers/md/dm-ioctl.c"
},
{
"cve": "CVE-2021-33033",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961300"
}
],
"notes": [
{
"category": "description",
"text": "A flaw use-after-free in the Linux kernel CIPSO network packet labeling protocol functionality was found in the way user open local network connection with the usage of the security labeling that is IP option number 134. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Considered to be Moderate rate, because by default CIPSO non-enabled and both no known way to reproduce the attack remotely and both it looks complex if even possible to use the attack in any way apart from crashing the system. For the usage of the inbound CIPSO connections, the administrator have to enable it with netlabelctl utility first. The vulnerability is considered to be for local user, because it can happen only when a local user opens a socket for sending packets, but not during receiving packets.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33033"
},
{
"category": "external",
"summary": "RHBZ#1961300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961300"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33033",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33033"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33033",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33033"
}
],
"release_date": "2021-03-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "The mitigation would be not allowing CIPSO labeling for the inbound network connections. For the most of the default configurations both for network routers and for the Linux servers itself it is disabled by default.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c"
},
{
"cve": "CVE-2021-33098",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-11-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2068236"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. This flaw allows an attacker who can modify the MTU of a virtualized PCIe device (in a guest, for example) to crash the host system\u2019s kernel if they set the MTU of the VF device to an unsupported value.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper input validation in the Intel(R) Ethernet ixgbe driver may allow an authenticated user to potentially enable DoS via local access",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33098"
},
{
"category": "external",
"summary": "RHBZ#2068236",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2068236"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33098",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33098"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33098",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33098"
}
],
"release_date": "2021-11-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Improper input validation in the Intel(R) Ethernet ixgbe driver may allow an authenticated user to potentially enable DoS via local access"
},
{
"cve": "CVE-2021-33200",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-05-27T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965458"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in kernel/bpf/verifier.c in BPF in the Linux kernel. An incorrect limit is enforced for pointer arithmetic operations which can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33200"
},
{
"category": "external",
"summary": "RHBZ#1965458",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965458"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33200",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33200"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33200",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33200"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=3d0220f6861d713213b015b582e9f21e5b28d2e0",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=3d0220f6861d713213b015b582e9f21e5b28d2e0"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=a7036191277f9fa68d92f2071ddc38c09b1e5ee5",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=a7036191277f9fa68d92f2071ddc38c09b1e5ee5"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=bb01a1bba579b4b1c5566af24d95f1767859771e",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=bb01a1bba579b4b1c5566af24d95f1767859771e"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/05/27/1",
"url": "https://www.openwall.com/lists/oss-security/2021/05/27/1"
}
],
"release_date": "2021-05-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier"
},
{
"cve": "CVE-2021-46905",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-02-27T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2266253"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel. This flaw occurs due to an unconditional NULL-pointer dereference on every disconnect in the Linux kernel.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: NULL-deref on disconnect regression",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-46905"
},
{
"category": "external",
"summary": "RHBZ#2266253",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266253"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-46905",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46905"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-46905",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-46905"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024022557-CVE-2021-46905-6507@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024022557-CVE-2021-46905-6507@gregkh/T"
}
],
"release_date": "2024-02-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: NULL-deref on disconnect regression"
},
{
"cve": "CVE-2021-46983",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-02-28T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2266906"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in an error-handling function in the Linux kernel\u0027s NVMe driver. This flaw allows an attacker with control over NVMe links to cause a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: nvmet-rdma: Fix NULL deref when SEND is completed with error",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-46983"
},
{
"category": "external",
"summary": "RHBZ#2266906",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266906"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-46983",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46983"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-46983",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-46983"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024022824-CVE-2021-46983-f808@gregkh/T/#u",
"url": "https://lore.kernel.org/linux-cve-announce/2024022824-CVE-2021-46983-f808@gregkh/T/#u"
}
],
"release_date": "2024-02-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: nvmet-rdma: Fix NULL deref when SEND is completed with error"
},
{
"cve": "CVE-2021-47011",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-02-28T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2266847"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: memcontrol: slab: fix obtain a reference to a freeing memcg\n\nPatch series \"Use obj_cgroup APIs to charge kmem pages\", v5.\n\nSince Roman\u0027s series \"The new cgroup slab memory controller\" applied.\nAll slab objects are charged with the new APIs of obj_cgroup. The new\nAPIs introduce a struct obj_cgroup to charge slab objects. It prevents\nlong-living objects from pinning the original memory cgroup in the\nmemory. But there are still some corner objects (e.g. allocations\nlarger than order-1 page on SLUB) which are not charged with the new\nAPIs. Those objects (include the pages which are allocated from buddy\nallocator directly) are charged as kmem pages which still hold a\nreference to the memory cgroup.\n\nE.g. We know that the kernel stack is charged as kmem pages because the\nsize of the kernel stack can be greater than 2 pages (e.g. 16KB on\nx86_64 or arm64). If we create a thread (suppose the thread stack is\ncharged to memory cgroup A) and then move it from memory cgroup A to\nmemory cgroup B. Because the kernel stack of the thread hold a\nreference to the memory cgroup A. The thread can pin the memory cgroup\nA in the memory even if we remove the cgroup A. If we want to see this\nscenario by using the following script. We can see that the system has\nadded 500 dying cgroups (This is not a real world issue, just a script\nto show that the large kmallocs are charged as kmem pages which can pin\nthe memory cgroup in the memory).\n\n\t#!/bin/bash\n\n\tcat /proc/cgroups | grep memory\n\n\tcd /sys/fs/cgroup/memory\n\techo 1 \u003e memory.move_charge_at_immigrate\n\n\tfor i in range{1..500}\n\tdo\n\t\tmkdir kmem_test\n\t\techo $$ \u003e kmem_test/cgroup.procs\n\t\tsleep 3600 \u0026\n\t\techo $$ \u003e cgroup.procs\n\t\techo `cat kmem_test/cgroup.procs` \u003e cgroup.procs\n\t\trmdir kmem_test\n\tdone\n\n\tcat /proc/cgroups | grep memory\n\nThis patchset aims to make those kmem pages to drop the reference to\nmemory cgroup by using the APIs of obj_cgroup. Finally, we can see that\nthe number of the dying cgroups will not increase if we run the above test\nscript.\n\nThis patch (of 7):\n\nThe rcu_read_lock/unlock only can guarantee that the memcg will not be\nfreed, but it cannot guarantee the success of css_get (which is in the\nrefill_stock when cached memcg changed) to memcg.\n\n rcu_read_lock()\n memcg = obj_cgroup_memcg(old)\n __memcg_kmem_uncharge(memcg)\n refill_stock(memcg)\n if (stock-\u003ecached != memcg)\n // css_get can change the ref counter from 0 back to 1.\n css_get(\u0026memcg-\u003ecss)\n rcu_read_unlock()\n\nThis fix is very like the commit:\n\n eefbfa7fd678 (\"mm: memcg/slab: fix use after free in obj_cgroup_charge\")\n\nFix this by holding a reference to the memcg which is passed to the\n__memcg_kmem_uncharge() before calling __memcg_kmem_uncharge().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mm: memcontrol: slab: fix obtain a reference to a freeing memcg",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47011"
},
{
"category": "external",
"summary": "RHBZ#2266847",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266847"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47011",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47011"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47011",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47011"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024022831-CVE-2021-47011-5b75@gregkh/T/#u",
"url": "https://lore.kernel.org/linux-cve-announce/2024022831-CVE-2021-47011-5b75@gregkh/T/#u"
}
],
"release_date": "2024-02-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: mm: memcontrol: slab: fix obtain a reference to a freeing memcg"
},
{
"cve": "CVE-2021-47080",
"cwe": {
"id": "CWE-369",
"name": "Divide By Zero"
},
"discovery_date": "2024-03-01T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2267533"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/core: Prevent divide-by-zero error triggered by the user\n\nThe user_entry_size is supplied by the user and later used as a\ndenominator to calculate number of entries. The zero supplied by the user\nwill trigger the following divide-by-zero error:\n\n divide error: 0000 [#1] SMP KASAN PTI\n CPU: 4 PID: 497 Comm: c_repro Not tainted 5.13.0-rc1+ #281\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\n RIP: 0010:ib_uverbs_handler_UVERBS_METHOD_QUERY_GID_TABLE+0x1b1/0x510\n Code: 87 59 03 00 00 e8 9f ab 1e ff 48 8d bd a8 00 00 00 e8 d3 70 41 ff 44 0f b7 b5 a8 00 00 00 e8 86 ab 1e ff 31 d2 4c 89 f0 31 ff \u003c49\u003e f7 f5 48 89 d6 48 89 54 24 10 48 89 04 24 e8 1b ad 1e ff 48 8b\n RSP: 0018:ffff88810416f828 EFLAGS: 00010246\n RAX: 0000000000000008 RBX: 1ffff1102082df09 RCX: ffffffff82183f3d\n RDX: 0000000000000000 RSI: ffff888105f2da00 RDI: 0000000000000000\n RBP: ffff88810416fa98 R08: 0000000000000001 R09: ffffed102082df5f\n R10: ffff88810416faf7 R11: ffffed102082df5e R12: 0000000000000000\n R13: 0000000000000000 R14: 0000000000000008 R15: ffff88810416faf0\n FS: 00007f5715efa740(0000) GS:ffff88811a700000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000000020000840 CR3: 000000010c2e0001 CR4: 0000000000370ea0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n Call Trace:\n ? ib_uverbs_handler_UVERBS_METHOD_INFO_HANDLES+0x4b0/0x4b0\n ib_uverbs_cmd_verbs+0x1546/0x1940\n ib_uverbs_ioctl+0x186/0x240\n __x64_sys_ioctl+0x38a/0x1220\n do_syscall_64+0x3f/0x80\n entry_SYSCALL_64_after_hwframe+0x44/0xae",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: RDMA/core: Prevent divide-by-zero error triggered by the user",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47080"
},
{
"category": "external",
"summary": "RHBZ#2267533",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267533"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47080",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47080"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47080",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47080"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024030142-CVE-2021-47080-eb20@gregkh/T/#u",
"url": "https://lore.kernel.org/linux-cve-announce/2024030142-CVE-2021-47080-eb20@gregkh/T/#u"
}
],
"release_date": "2024-03-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: RDMA/core: Prevent divide-by-zero error triggered by the user"
},
{
"cve": "CVE-2022-20166",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-08-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2122089"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s sysfs layer. This flaw allows a local user who can read files under the /sysfs mount point to corrupt memory or possibly crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: possible buffer overflow in sysfs reading",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-20166"
},
{
"category": "external",
"summary": "RHBZ#2122089",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122089"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-20166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20166"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-20166",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-20166"
}
],
"release_date": "2022-08-15T14:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: possible buffer overflow in sysfs reading"
},
{
"cve": "CVE-2022-50042",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373691"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the netlink driver in the Linux kernel. A memory leak can occur when allocated memory is not released in certain error cases, potentially impacting system performance and resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net: genl: fix error path memory leak in policy dumping",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue has been fixed in Red Hat Enterprise Linux 8.5, 9.2 and 9.3 via RHSA-2021:4356 [1], RHSA-2023:7370 [2] and RHSA-2023:6583 [3], respectively.\n\n[1]. https://access.redhat.com/errata/RHSA-2021:4356\n\n[2]. https://access.redhat.com/errata/RHSA-2023:7370\n\n[3]. https://access.redhat.com/errata/RHSA-2023:6583",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50042"
},
{
"category": "external",
"summary": "RHBZ#2373691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373691"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50042",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50042"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50042",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50042"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061843-CVE-2022-50042-7d6f@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061843-CVE-2022-50042-7d6f@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: net: genl: fix error path memory leak in policy dumping"
},
{
"cve": "CVE-2022-50073",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373494"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the tap module in the Linux kernel. A NULL pointer dereference can be triggered due to a missing initialization, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net: tap: NULL pointer derefence in dev_parse_header_protocol when skb-\u003edev is null",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue has been fixed in Red Hat Enterprise Linux 8.5 and 9.5 via RHSA-2021:4356 [1] and RHSA-2024:9315 [2], respectively.\n\n[1]. https://access.redhat.com/errata/RHSA-2021:4356\n\n[2]. https://access.redhat.com/errata/RHSA-2024:9315",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50073"
},
{
"category": "external",
"summary": "RHBZ#2373494",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373494"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50073",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50073"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50073",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50073"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061854-CVE-2022-50073-7199@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061854-CVE-2022-50073-7199@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net: tap: NULL pointer derefence in dev_parse_header_protocol when skb-\u003edev is null"
},
{
"cve": "CVE-2023-53598",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2025-10-04T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2401500"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbus: mhi: host: Range check CHDBOFF and ERDBOFF\n\nIf the value read from the CHDBOFF and ERDBOFF registers is outside the\nrange of the MHI register space then an invalid address might be computed\nwhich later causes a kernel panic. Range check the read value to prevent\na crash due to bad data from the device.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: bus: mhi: host: Range check CHDBOFF and ERDBOFF",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "MHI devices communicate channel configuration through doorbell offset values (CHDBOFF and ERDBOFF) that index into the device\u0027s register space. The driver reads these offsets from device memory during initialization but historically failed to validate that they fall within legitimate bounds. A malicious device\u2014or a legitimate device with corrupted firmware\u2014can supply offset values that point outside the allocated channel context array. When the driver attempts to use these offsets, it accesses arbitrary kernel memory, typically triggering an immediate panic. Physical access is generally required to connect a malicious device, though in some cases (like M.2 modems) a compromised device firmware could supply bad values.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-53598"
},
{
"category": "external",
"summary": "RHBZ#2401500",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401500"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-53598",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53598"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-53598",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-53598"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025100429-CVE-2023-53598-cbd8@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025100429-CVE-2023-53598-cbd8@gregkh/T"
}
],
"release_date": "2025-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T18:06:54+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src",
"CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x",
"CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: bus: mhi: host: Range check CHDBOFF and ERDBOFF"
}
]
}
rhsa-2021_4140
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n* kernel: out-of-bounds reads in pinctrl subsystem. (CVE-2020-0427)\n* kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24502)\n* kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24503)\n* kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24504)\n* kernel: Fragmentation cache not cleared on reconnection (CVE-2020-24586)\n* kernel: Reassembling fragments encrypted under different keys (CVE-2020-24587)\n* kernel: wifi frame payload being parsed incorrectly as an L2 frame (CVE-2020-24588)\n* kernel: Forwarding EAPOL from unauthenticated wifi client (CVE-2020-26139)\n* kernel: accepting plaintext data frames in protected networks (CVE-2020-26140)\n* kernel: not verifying TKIP MIC of fragmented frames (CVE-2020-26141)\n* kernel: accepting fragmented plaintext frames in protected networks (CVE-2020-26143)\n* kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header (CVE-2020-26144)\n* kernel: accepting plaintext broadcast fragments as full frames (CVE-2020-26145)\n* kernel: locking inconsistency in tty_io.c and tty_jobctrl.c can lead to a read-after-free (CVE-2020-29660)\n* kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function via a long SSID value (CVE-2020-36158)\n* kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() (CVE-2020-36386)\n* kernel: Improper access control in BlueZ may allow information disclosure vulnerability. (CVE-2021-0129)\n* kernel: Use-after-free in ndb_queue_rq() (CVE-2021-3348)\n* kernel: Linux kernel eBPF RINGBUF map oversized allocation (CVE-2021-3489)\n* kernel: double free in bluetooth subsystem when the HCI device initialization fails (CVE-2021-3564)\n* kernel: use-after-free in function hci_sock_bound_ioctl() (CVE-2021-3573)\n* kernel: eBPF 32-bit source register truncation on div/mod (CVE-2021-3600)\n* kernel: DoS in rb_per_cpu_empty() (CVE-2021-3679)\n* kernel: overlayfs: Mounting overlayfs inside an unprivileged user namespace can reveal files (CVE-2021-3732)\n* kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt() (CVE-2021-20194)\n* kernel: Race condition in sctp_destroy_sock list_del (CVE-2021-23133)\n* kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode (CVE-2021-28950)\n* kernel: System crash in intel_pmu_drain_pebs_nhm (CVE-2021-28971)\n* kernel: protection for sequences of pointer arithmetic operations against speculatively out-of-bounds loads can be bypassed to leak content of kernel memory (CVE-2021-29155)\n* kernel: improper input validation in tipc_nl_retrieve_key function (CVE-2021-29646)\n* kernel: lack a full memory barrier upon the assignment of a new table value in x_tables.h may lead to DoS (CVE-2021-29650)\n* kernel: local escalation of privileges in handling of eBPF programs (CVE-2021-31440)\n* kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory (CVE-2021-31829)\n* kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier (CVE-2021-33200)\n* kernel: reassembling encrypted fragments with non-consecutive packet numbers (CVE-2020-26146)\n* kernel: reassembling mixed encrypted/plaintext fragments (CVE-2020-26147)\n* kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check (CVE-2020-29368)\n* kernel: flowtable list del corruption with kernel BUG (CVE-2021-3635)\n* kernel: NULL pointer dereference in llsec_key_alloc() (CVE-2021-3659)\n* kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure (CVE-2021-20239)\n* kernel: out of bounds array access in drivers/md/dm-ioctl.c (CVE-2021-31916)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:4140",
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/"
},
{
"category": "external",
"summary": "1875275",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1875275"
},
{
"category": "external",
"summary": "1902412",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902412"
},
{
"category": "external",
"summary": "1903244",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903244"
},
{
"category": "external",
"summary": "1905747",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905747"
},
{
"category": "external",
"summary": "1906522",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906522"
},
{
"category": "external",
"summary": "1912683",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912683"
},
{
"category": "external",
"summary": "1913348",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913348"
},
{
"category": "external",
"summary": "1919893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919893"
},
{
"category": "external",
"summary": "1921958",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921958"
},
{
"category": "external",
"summary": "1923636",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1923636"
},
{
"category": "external",
"summary": "1930376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930376"
},
{
"category": "external",
"summary": "1930379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930379"
},
{
"category": "external",
"summary": "1930381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930381"
},
{
"category": "external",
"summary": "1941762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941762"
},
{
"category": "external",
"summary": "1941784",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941784"
},
{
"category": "external",
"summary": "1945345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945345"
},
{
"category": "external",
"summary": "1945388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945388"
},
{
"category": "external",
"summary": "1946965",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946965"
},
{
"category": "external",
"summary": "1948772",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1948772"
},
{
"category": "external",
"summary": "1951595",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951595"
},
{
"category": "external",
"summary": "1957788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1957788"
},
{
"category": "external",
"summary": "1959559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959559"
},
{
"category": "external",
"summary": "1959642",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959642"
},
{
"category": "external",
"summary": "1959654",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959654"
},
{
"category": "external",
"summary": "1959657",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959657"
},
{
"category": "external",
"summary": "1959663",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959663"
},
{
"category": "external",
"summary": "1960490",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960490"
},
{
"category": "external",
"summary": "1960492",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960492"
},
{
"category": "external",
"summary": "1960496",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960496"
},
{
"category": "external",
"summary": "1960498",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960498"
},
{
"category": "external",
"summary": "1960500",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960500"
},
{
"category": "external",
"summary": "1960502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960502"
},
{
"category": "external",
"summary": "1960504",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960504"
},
{
"category": "external",
"summary": "1964028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964028"
},
{
"category": "external",
"summary": "1964139",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964139"
},
{
"category": "external",
"summary": "1965038",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965038"
},
{
"category": "external",
"summary": "1965458",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965458"
},
{
"category": "external",
"summary": "1966578",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966578"
},
{
"category": "external",
"summary": "1969489",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1969489"
},
{
"category": "external",
"summary": "1975949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975949"
},
{
"category": "external",
"summary": "1976946",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976946"
},
{
"category": "external",
"summary": "1981954",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981954"
},
{
"category": "external",
"summary": "1989165",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989165"
},
{
"category": "external",
"summary": "1995249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995249"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4140.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2024-12-20T20:35:51+00:00",
"generator": {
"date": "2024-12-20T20:35:51+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.4"
}
},
"id": "RHSA-2021:4140",
"initial_release_date": "2021-11-09T17:26:23+00:00",
"revision_history": [
{
"date": "2021-11-09T17:26:23+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-11-09T17:26:23+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-20T20:35:51+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::nfv"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::realtime"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"product": {
"name": "kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"product_id": "kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-348.rt7.130.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-348.rt7.130.el8.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src"
},
"product_reference": "kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-348.rt7.130.el8.src as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src"
},
"product_reference": "kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-14615",
"cwe": {
"id": "CWE-212",
"name": "Improper Removal of Sensitive Information Before Storage or Transfer"
},
"discovery_date": "2020-01-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1789209"
}
],
"notes": [
{
"category": "description",
"text": "An information disclosure flaw was found in the Linux kernel. The i915 graphics driver lacks control of flow for data structures which may allow a local, authenticated user to disclose information when using ioctl commands with an attached i915 device. The highest threat from this vulnerability is to data confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Intel graphics card information leak.",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, 8 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 6, 7, and 8 may address this issue.\n\nThis has been rated as having Moderate security impact and is not currently planned to be addressed in future updates of Red Hat Enterprise MRG 2.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-14615"
},
{
"category": "external",
"summary": "RHBZ#1789209",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789209"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-14615",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14615"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14615",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14615"
}
],
"release_date": "2020-01-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Preventing loading of the i915 kernel module will prevent attackers from using this exploit against the system; however, the power management functionality of the card will be disabled and the system may draw additional power. See the kcs \u201cHow do I blacklist a kernel module to prevent it from loading automatically?\u201c (https://access.redhat.com/solutions/41278) for instructions on how to disable a kernel module from autoloading. Graphical displays may also be at low resolution or not work correctly.\n\nThis mitigation may not be suitable if the graphical login functionality is required.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Intel graphics card information leak."
},
{
"cve": "CVE-2020-0427",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-01-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1919893"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux pinctrl system. It is possible to trigger an of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds reads in pinctrl subsystem.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-0427"
},
{
"category": "external",
"summary": "RHBZ#1919893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919893"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-0427",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0427"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0427",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0427"
}
],
"release_date": "2020-11-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: out-of-bounds reads in pinctrl subsystem."
},
{
"cve": "CVE-2020-24502",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-02-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1930379"
}
],
"notes": [
{
"category": "description",
"text": "Improper input validation in some Intel(R) Ethernet E810 Adapter drivers for Linux may allow an authenticated user to potentially enable a denial of service via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24502"
},
{
"category": "external",
"summary": "RHBZ#1930379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930379"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24502",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24502"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24502",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24502"
}
],
"release_date": "2021-02-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers"
},
{
"cve": "CVE-2020-24503",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-02-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1930381"
}
],
"notes": [
{
"category": "description",
"text": "Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers for Linux may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24503"
},
{
"category": "external",
"summary": "RHBZ#1930381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930381"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24503",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24503"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24503",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24503"
}
],
"release_date": "2021-02-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers"
},
{
"cve": "CVE-2020-24504",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-02-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1930376"
}
],
"notes": [
{
"category": "description",
"text": "An uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers for Linux may allow an authenticated user to potentially cause a denial of service via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24504"
},
{
"category": "external",
"summary": "RHBZ#1930376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930376"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24504",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24504"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24504",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24504"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html"
}
],
"release_date": "2021-02-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers"
},
{
"cve": "CVE-2020-24586",
"cwe": {
"id": "CWE-212",
"name": "Improper Removal of Sensitive Information Before Storage or Transfer"
},
"discovery_date": "2021-05-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1959642"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernels implementation of wifi fragmentation handling. An attacker with the ability to transmit within the wireless transmission range of an access point can abuse a flaw where previous contents of wifi fragments can be unintentionally transmitted to another device.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Fragmentation cache not cleared on reconnection",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "RHBZ#1959642",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959642"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24586"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/"
}
],
"release_date": "2021-05-12T01:20:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Fragmentation cache not cleared on reconnection"
},
{
"cve": "CVE-2020-24587",
"cwe": {
"id": "CWE-345",
"name": "Insufficient Verification of Data Authenticity"
},
"discovery_date": "2021-05-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1959654"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u0027s WiFi implementation. An attacker within the wireless range can abuse a logic flaw in the WiFi implementation by reassembling packets from multiple fragments under different keys, treating them as valid. This flaw allows an attacker to send a fragment under an incorrect key, treating them as a valid fragment under the new key. The highest threat from this vulnerability is to confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Reassembling fragments encrypted under different keys",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "RHBZ#1959654",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959654"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24587",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24587"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24587",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24587"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/"
}
],
"release_date": "2021-05-11T14:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.1,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Reassembling fragments encrypted under different keys"
},
{
"cve": "CVE-2020-24588",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-05-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1959657"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernels wifi implementation. An attacker within wireless broadcast range can inject custom data into the wireless communication circumventing checks on the data. This can cause the frame to pass checks and be considered a valid frame of a different type.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: wifi frame payload being parsed incorrectly as an L2 frame",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "RHBZ#1959657",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959657"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24588",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24588"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24588",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24588"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.25d93176ddaf.I9e265b597f2cd23eb44573f35b625947b386a9de@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.25d93176ddaf.I9e265b597f2cd23eb44573f35b625947b386a9de@changeid/"
}
],
"release_date": "2021-05-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: wifi frame payload being parsed incorrectly as an L2 frame"
},
{
"cve": "CVE-2020-26139",
"cwe": {
"id": "CWE-829",
"name": "Inclusion of Functionality from Untrusted Control Sphere"
},
"discovery_date": "2021-05-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1959663"
}
],
"notes": [
{
"category": "description",
"text": "Frames used for authentication and key management between the AP and connected clients. Some clients may take these redirected frames masquerading as control mechanisms from the AP.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Forwarding EAPOL from unauthenticated wifi client",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26139"
},
{
"category": "external",
"summary": "RHBZ#1959663",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959663"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26139"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26139",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26139"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.cb327ed0cabe.Ib7dcffa2a31f0913d660de65ba3c8aca75b1d10f@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.cb327ed0cabe.Ib7dcffa2a31f0913d660de65ba3c8aca75b1d10f@changeid/"
}
],
"release_date": "2021-05-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Forwarding EAPOL from unauthenticated wifi client"
},
{
"cve": "CVE-2020-26140",
"cwe": {
"id": "CWE-346",
"name": "Origin Validation Error"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960490"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Linux kernel. Where the WiFi implementations accept plaintext frames in a protected WiFi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: accepting plaintext data frames in protected networks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26140"
},
{
"category": "external",
"summary": "RHBZ#1960490",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960490"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26140",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26140"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26140",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26140"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: accepting plaintext data frames in protected networks"
},
{
"cve": "CVE-2020-26141",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960492"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Linux kernel\u0027s WiFi implementation. An attacker within wireless range can inject a control packet fragment where the kernel does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: not verifying TKIP MIC of fragmented frames",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "RHBZ#1960492",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960492"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26141"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26141",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26141"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.c3f1d42c6746.I795593fcaae941c471425b8c7d5f7bb185d29142@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.c3f1d42c6746.I795593fcaae941c471425b8c7d5f7bb185d29142@changeid/"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: not verifying TKIP MIC of fragmented frames"
},
{
"cve": "CVE-2020-26143",
"cwe": {
"id": "CWE-346",
"name": "Origin Validation Error"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960496"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Linux kernel, where the WiFi implementations assemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: accepting fragmented plaintext frames in protected networks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26143"
},
{
"category": "external",
"summary": "RHBZ#1960496",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960496"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26143",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26143"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26143",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26143"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: accepting fragmented plaintext frames in protected networks"
},
{
"cve": "CVE-2020-26144",
"cwe": {
"id": "CWE-290",
"name": "Authentication Bypass by Spoofing"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960498"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel, where the WiFi implementations accept plaintext A-MSDU frames as long as the first 8 bytes correspond to a valid RFC1042 (ex., LLC/SNAP) header for EAPOL. The highest threat from this vulnerability is to integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26144"
},
{
"category": "external",
"summary": "RHBZ#1960498",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960498"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26144",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26144"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26144",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26144"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header"
},
{
"cve": "CVE-2020-26145",
"cwe": {
"id": "CWE-307",
"name": "Improper Restriction of Excessive Authentication Attempts"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960500"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in ath10k_htt_rx_proc_rx_frag_ind_hl in drivers/net/wireless/ath/ath10k/htt_rx.c in the Linux kernel WiFi implementations, where it accepts a second (or subsequent) broadcast fragments even when sent in plaintext and then process them as full unfragmented frames. The highest threat from this vulnerability is to integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: accepting plaintext broadcast fragments as full frames",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26145"
},
{
"category": "external",
"summary": "RHBZ#1960500",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960500"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26145"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26145",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26145"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.9ca6ca7945a9.I1e18b514590af17c155bda86699bc3a971a8dcf4@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.9ca6ca7945a9.I1e18b514590af17c155bda86699bc3a971a8dcf4@changeid/"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: accepting plaintext broadcast fragments as full frames"
},
{
"cve": "CVE-2020-26146",
"cwe": {
"id": "CWE-307",
"name": "Improper Restriction of Excessive Authentication Attempts"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960502"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Linux kernel, where the WiFi implementation reassemble fragments with non-consecutive packet numbers. An adversary can abuse this to exfiltrate selected fragments. This vulnerability is exploitable when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used. Note that WEP is vulnerable to this attack by design.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: reassembling encrypted fragments with non-consecutive packet numbers",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26146"
},
{
"category": "external",
"summary": "RHBZ#1960502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960502"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26146"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26146",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26146"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: reassembling encrypted fragments with non-consecutive packet numbers"
},
{
"cve": "CVE-2020-26147",
"cwe": {
"id": "CWE-307",
"name": "Improper Restriction of Excessive Authentication Attempts"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960504"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in ieee80211_rx_h_defragment in net/mac80211/rx.c in the Linux Kernel\u0027s WiFi implementation. This vulnerability can be abused to inject packets or exfiltrate selected fragments when another device sends fragmented frames, and the WEP, CCMP, or GCMP data-confidentiality protocol is used. The highest threat from this vulnerability is to integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: reassembling mixed encrypted/plaintext fragments",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26147"
},
{
"category": "external",
"summary": "RHBZ#1960504",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960504"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26147",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26147"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.30c4394bb835.I5acfdb552cc1d20c339c262315950b3eac491397@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.30c4394bb835.I5acfdb552cc1d20c339c262315950b3eac491397@changeid/"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: reassembling mixed encrypted/plaintext fragments"
},
{
"cve": "CVE-2020-29368",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-12-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903244"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw has been rated as having Moderateimpact because, based on Red Hat\u0027s assessment, this issue is hard to exploit in practice because the race window is too small for it to be reliable.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-29368"
},
{
"category": "external",
"summary": "RHBZ#1903244",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903244"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-29368",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29368"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29368",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29368"
}
],
"release_date": "2020-06-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check"
},
{
"cve": "CVE-2020-29660",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2020-12-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1906522"
}
],
"notes": [
{
"category": "description",
"text": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel. A local user could use this flaw to read numerical value from memory after free.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: locking inconsistency in drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c can lead to a read-after-free",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having Low impact (Red Hat Enterprise Linux 7) because of the need to have CAP_SYS_TTY_CONFIG privileges.\n\nThis flaw is rated as having Moderate (Red Hat Enterprise Linux 8) impact because of the need to have CAP_SYS_TTY_CONFIG privileges. Red Hat Enterprise Linux 8 enabled unprivileged user/network namespaces by default which can be used to exercise this vulnerability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-29660"
},
{
"category": "external",
"summary": "RHBZ#1906522",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906522"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-29660",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29660"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29660",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29660"
}
],
"release_date": "2020-12-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: locking inconsistency in drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c can lead to a read-after-free"
},
{
"cve": "CVE-2020-36158",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2021-01-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1913348"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. The marvell wifi driver could allow a local attacker to execute arbitrary code via a long SSID value in mwifiex_cmd_802_11_ad_hoc_start function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function in drivers/net/wireless/marvell/mwifiex/join.c via a long SSID value",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having Moderate impact because the attacker needs to be local and privileged enough to be able to initiate ad-hoc WIFI network creation.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36158"
},
{
"category": "external",
"summary": "RHBZ#1913348",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913348"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36158",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36158"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36158",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36158"
}
],
"release_date": "2020-12-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module mwifiex from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function in drivers/net/wireless/marvell/mwifiex/join.c via a long SSID value"
},
{
"cve": "CVE-2020-36312",
"cwe": {
"id": "CWE-772",
"name": "Missing Release of Resource after Effective Lifetime"
},
"discovery_date": "2021-04-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1947991"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the KVM hypervisor of the Linux kernel. A memory leak could occur in kvm_io_bus_unregister_dev() upon a kmalloc failure. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: memory leak upon a kmalloc failure in kvm_io_bus_unregister_dev function in virt/kvm/kvm_main.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36312"
},
{
"category": "external",
"summary": "RHBZ#1947991",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1947991"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36312",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36312"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36312",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36312"
}
],
"release_date": "2020-09-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: memory leak upon a kmalloc failure in kvm_io_bus_unregister_dev function in virt/kvm/kvm_main.c"
},
{
"cve": "CVE-2020-36386",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2021-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1969489"
}
],
"notes": [
{
"category": "description",
"text": "A flaw out of bounds memory access in the Linux kernel bluetooth subsystem was found in the way when some data being read about the bluetooth device with the hci_extended_inquiry_result_evt call. A local user could use this flaw to crash the system or read some data out of memory bounds that can lead to data confidentiality threat.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() in net/bluetooth/hci_event.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having a Moderate impact because even the data being read out of memory bounds is written to some cache, it was known before that this data from non-safe source and as result no any sensitive dependencies on this data.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36386"
},
{
"category": "external",
"summary": "RHBZ#1969489",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1969489"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36386",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36386"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36386",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36386"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51c19bf3d5cfaa66571e4b88ba2a6f6295311101",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51c19bf3d5cfaa66571e4b88ba2a6f6295311101"
}
],
"release_date": "2020-07-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module bluetooth from being loaded (if Bluetooth not required for the system). Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() in net/bluetooth/hci_event.c"
},
{
"cve": "CVE-2021-0129",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965038"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access. The highest threat from this vulnerability is to data confidentiality and integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper access control in BlueZ may allow information disclosure vulnerability.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0129"
},
{
"category": "external",
"summary": "RHBZ#1965038",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965038"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0129"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0129",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0129"
}
],
"release_date": "2021-06-08T03:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Improper access control in BlueZ may allow information disclosure vulnerability."
},
{
"cve": "CVE-2021-3348",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-01-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1921958"
}
],
"notes": [
{
"category": "description",
"text": "A use after free flaw in the Linux kernel network block device (NBD) subsystem was found in the way user calls an ioctl NBD_SET_SOCK at a certain point during device setup.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use-after-free in ndb_queue_rq() in drivers/block/nbd.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having a Moderate impact because in the default configuration, the issue can only be triggered by a privileged local user (with access to the nbd device).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3348"
},
{
"category": "external",
"summary": "RHBZ#1921958",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921958"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3348",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3348"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3348",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3348"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-block/24dff677353e2e30a71d8b66c4dffdbdf77c4dbd.1611595239.git.josef@toxicpanda.com/",
"url": "https://lore.kernel.org/linux-block/24dff677353e2e30a71d8b66c4dffdbdf77c4dbd.1611595239.git.josef@toxicpanda.com/"
}
],
"release_date": "2021-01-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module nbd from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Use-after-free in ndb_queue_rq() in drivers/block/nbd.c"
},
{
"acknowledgments": [
{
"names": [
"Ryota Shiga"
]
}
],
"cve": "CVE-2021-3489",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1959559"
}
],
"notes": [
{
"category": "description",
"text": "A flaw out of bound memory write in the Linux kernel BPF subsystem was found in the way user writes to BPF ring buffer too fast, so larger buffer than available memory could be allocated. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Linux kernel eBPF RINGBUF map oversized allocation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3489"
},
{
"category": "external",
"summary": "RHBZ#1959559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959559"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3489",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3489"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3489",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3489"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=4b81ccebaeee885ab1aa1438133f2991e3a2b6ea",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=4b81ccebaeee885ab1aa1438133f2991e3a2b6ea"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/05/11/10",
"url": "https://www.openwall.com/lists/oss-security/2021/05/11/10"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Linux kernel eBPF RINGBUF map oversized allocation"
},
{
"acknowledgments": [
{
"names": [
"HaoXiong, LinMa"
],
"organization": "ckSec"
}
],
"cve": "CVE-2021-3564",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"discovery_date": "2021-05-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1964139"
}
],
"notes": [
{
"category": "description",
"text": "A flaw double-free memory corruption in the Linux kernel HCI device initialization subsystem was found in the way user attach malicious HCI TTY Bluetooth device. A local user could use this flaw to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: double free in bluetooth subsystem when the HCI device initialization fails",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The impact is Moderate, because the double free happens during flush procedure, and no use of incorrect data during flush finishing even if double free could happen without kernel crash.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3564"
},
{
"category": "external",
"summary": "RHBZ#1964139",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964139"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3564"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3564",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3564"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/05/25/1",
"url": "https://www.openwall.com/lists/oss-security/2021/05/25/1"
}
],
"release_date": "2021-05-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: double free in bluetooth subsystem when the HCI device initialization fails"
},
{
"cve": "CVE-2021-3573",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1966578"
}
],
"notes": [
{
"category": "description",
"text": "A flaw use-after-free in function hci_sock_bound_ioctl() of the Linux kernel HCI subsystem was found in the way user calls ioct HCIUNBLOCKADDR or other way triggers race condition of the call hci_unregister_dev() together with one of the calls hci_sock_blacklist_add(), hci_sock_blacklist_del(), hci_get_conn_info(), hci_get_auth_info(). A privileged local user could use this flaw to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in function hci_sock_bound_ioctl()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having a Moderate impact because of the privileges (CAP_NET_ADMIN in initial namespace) required for exploiting the issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3573"
},
{
"category": "external",
"summary": "RHBZ#1966578",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966578"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3573",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3573"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth.git/commit/?id=e305509e678b3a4af2b3cfd410f409f7cdaabb52",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth.git/commit/?id=e305509e678b3a4af2b3cfd410f409f7cdaabb52"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/06/08/2",
"url": "https://www.openwall.com/lists/oss-security/2021/06/08/2"
}
],
"release_date": "2021-06-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising easThe required privileges is CAP_NET_ADMIN capabilities. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.e of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in function hci_sock_bound_ioctl()"
},
{
"cve": "CVE-2021-3600",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1981954"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s eBPF verification code, where the eBPF 32-bit div/mod source register truncation could lead to out-of-bounds reads and writes. By default, accessing the eBPF verifier is only possible to privileged users with CAP_SYS_ADMIN. This flaw allows a local user who can run eBPF instructions to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: eBPF 32-bit source register truncation on div/mod",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3600"
},
{
"category": "external",
"summary": "RHBZ#1981954",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981954"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3600"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3600",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3600"
},
{
"category": "external",
"summary": "https://lore.kernel.org/patchwork/patch/1379497/",
"url": "https://lore.kernel.org/patchwork/patch/1379497/"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/06/23/1",
"url": "https://www.openwall.com/lists/oss-security/2021/06/23/1"
}
],
"release_date": "2021-06-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: eBPF 32-bit source register truncation on div/mod"
},
{
"cve": "CVE-2021-3635",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-06-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1976946"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel netfilter implementation. A user with root (CAP_SYS_ADMIN) access is able to panic the system when issuing netfilter netflow commands",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: flowtable list del corruption with kernel BUG at lib/list_debug.c:50",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3635"
},
{
"category": "external",
"summary": "RHBZ#1976946",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976946"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3635",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3635"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3635",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3635"
}
],
"release_date": "2021-08-06T04:47:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: flowtable list del corruption with kernel BUG at lib/list_debug.c:50"
},
{
"cve": "CVE-2021-3659",
"cwe": {
"id": "CWE-252",
"name": "Unchecked Return Value"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1975949"
}
],
"notes": [
{
"category": "description",
"text": "A NULL pointer dereference flaw was found in the Linux kernel\u2019s IEEE 802.15.4 wireless networking subsystem in the way the user closes the LR-WPAN connection. This flaw allows a local user to crash the system. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3659"
},
{
"category": "external",
"summary": "RHBZ#1975949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975949"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3659",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3659"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3659",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3659"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8"
}
],
"release_date": "2021-04-06T19:22:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module mac802154 from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c"
},
{
"acknowledgments": [
{
"names": [
"Haoran Luo"
],
"organization": "Chaitin Tech"
}
],
"cve": "CVE-2021-3679",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-07-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1989165"
}
],
"notes": [
{
"category": "description",
"text": "A lack of CPU resources in the Linux kernel tracing module functionality was found in the way users use the trace ring buffer in specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: DoS in rb_per_cpu_empty()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3679"
},
{
"category": "external",
"summary": "RHBZ#1989165",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989165"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3679",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3679"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3679",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3679"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20210723125527.767d1c18@oasis.local.home/",
"url": "https://lore.kernel.org/lkml/20210723125527.767d1c18@oasis.local.home/"
}
],
"release_date": "2021-07-20T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: DoS in rb_per_cpu_empty()"
},
{
"acknowledgments": [
{
"names": [
"Miklos Szeredi"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2021-3732",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-08-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1995249"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s OverlayFS subsystem in the way the user mounts the TmpFS filesystem with OverlayFS. This flaw allows a local user to gain access to hidden files that should not be accessible.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: overlayfs: Mounting overlayfs inside an unprivileged user namespace can reveal files",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3732"
},
{
"category": "external",
"summary": "RHBZ#1995249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995249"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3732",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3732"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3732",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3732"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=427215d85e8d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=427215d85e8d"
}
],
"release_date": "2021-08-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: overlayfs: Mounting overlayfs inside an unprivileged user namespace can reveal files"
},
{
"acknowledgments": [
{
"names": [
"Loris Reiff"
]
}
],
"cve": "CVE-2021-20194",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2020-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1912683"
}
],
"notes": [
{
"category": "description",
"text": "A flaw buffer overflow in the Linux kernel BPF subsystem was found in the way user running BPF script calling getsockopt. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having Moderate impact because of the need to have elevated privileges or non-standard configuration for running BPF script.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-20194"
},
{
"category": "external",
"summary": "RHBZ#1912683",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912683"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-20194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20194"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20194",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20194"
}
],
"release_date": "2021-01-22T10:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\n\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt()"
},
{
"cve": "CVE-2021-20239",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1923636"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the BPF protocol. This flaw allows an attacker with a local account to leak information about kernel internal addresses. The highest threat from this vulnerability is to confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-20239"
},
{
"category": "external",
"summary": "RHBZ#1923636",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1923636"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-20239",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20239"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20239",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20239"
}
],
"release_date": "2021-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Loading a filter is a privileged (CAP_SYS_ADMIN or root) operation. Once any filter is used, this attack is capable of being used by an unprivileged user. There is no known mitigation that product security finds suitable for this flaw.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.8,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure"
},
{
"acknowledgments": [
{
"names": [
"Or Cohen"
],
"organization": "Palo Alto Networks"
}
],
"cve": "CVE-2021-23133",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-04-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1948772"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s SCTP socket functionality that triggers a race condition. This flaw allows a local user to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Race condition in sctp_destroy_sock list_del",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having a Moderate impact because of the privileges required for running the known reproducer. The required privileges are CAP_BPF and CAP_NET_ADMIN capabilities that are disabled by default in Red Hat Enterprise Linux 7. For Red Hat Enterprise Linux 8, the SCTP protocol itself is disabled by default and cannot be used by a user without enablement by an administrator.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-23133"
},
{
"category": "external",
"summary": "RHBZ#1948772",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1948772"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23133"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23133",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23133"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b"
}
],
"release_date": "2021-04-18T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module sctp from being loaded (and this is so by default for Red Hat Enterprise Linux 8). Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Race condition in sctp_destroy_sock list_del"
},
{
"cve": "CVE-2021-28950",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2021-03-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1941762"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service in the kernel side of the FUSE functionality can allow a local system to create a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-28950"
},
{
"category": "external",
"summary": "RHBZ#1941762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941762"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-28950",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28950"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-28950",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-28950"
}
],
"release_date": "2021-03-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "As the FUSE module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install fuse /bin/true\" \u003e\u003e /etc/modprobe.d/disable-fuse.conf\n\nThe system will need to be restarted if the FUSE modules are loaded. In most circumstances, the CIFS kernel modules will be unable to be unloaded while the FUSE filesystems are in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode"
},
{
"cve": "CVE-2021-28971",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2021-03-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1941784"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. On some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: System crash in intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-28971"
},
{
"category": "external",
"summary": "RHBZ#1941784",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941784"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-28971",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28971"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-28971",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-28971"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: System crash in intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c"
},
{
"cve": "CVE-2021-29155",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2021-04-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1951595"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was discovered in retrieve_ptr_limit in kernel/bpf/verifier.c in the Linux kernel mechanism to mitigate speculatively out-of-bounds loads (Spectre mitigation). In this flaw a local, special user privileged (CAP_SYS_ADMIN) BPF program running on affected systems may bypass the protection, and execute speculatively out-of-bounds loads from the kernel memory. This can be abused to extract contents of kernel memory via side-channel.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: protection for sequences of pointer arithmetic operations against speculatively out-of-bounds loads can be bypassed to leak content of kernel memory",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29155"
},
{
"category": "external",
"summary": "RHBZ#1951595",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951595"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29155"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29155",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29155"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/04/18/4",
"url": "https://www.openwall.com/lists/oss-security/2021/04/18/4"
}
],
"release_date": "2021-04-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: protection for sequences of pointer arithmetic operations against speculatively out-of-bounds loads can be bypassed to leak content of kernel memory"
},
{
"cve": "CVE-2021-29646",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-03-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1945345"
}
],
"notes": [
{
"category": "description",
"text": "A flaw buffer overflow in the Linux kernel TIPC protocol functionality was found in the way user uses protocol with encryption enabled. A local user could use this flaw to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: improper input validation in tipc_nl_retrieve_key function in net/tipc/node.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29646"
},
{
"category": "external",
"summary": "RHBZ#1945345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945345"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29646",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29646"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29646",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29646"
}
],
"release_date": "2021-03-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: improper input validation in tipc_nl_retrieve_key function in net/tipc/node.c"
},
{
"cve": "CVE-2021-29650",
"cwe": {
"id": "CWE-662",
"name": "Improper Synchronization"
},
"discovery_date": "2021-03-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1945388"
}
],
"notes": [
{
"category": "description",
"text": "A denial-of-service (DoS) flaw was identified in the Linux kernel due to an incorrect memory barrier in xt_replace_table in net/netfilter/x_tables.c in the netfilter subsystem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29650"
},
{
"category": "external",
"summary": "RHBZ#1945388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945388"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29650",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29650"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1"
}
],
"release_date": "2021-03-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS"
},
{
"acknowledgments": [
{
"names": [
"Manfred Paul"
],
"organization": "RedRocket CTF team"
}
],
"cve": "CVE-2021-31440",
"cwe": {
"id": "CWE-682",
"name": "Incorrect Calculation"
},
"discovery_date": "2021-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1964028"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds access flaw was found in the Linux kernel\u2019s implementation of the eBPF code verifier, where an incorrect register bounds calculation while checking unsigned 32-bit instructions in an eBPF program occurs.. By default accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN. The issue results from the lack of proper validation of user-supplied eBPF programs prior to executing them. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: local escalation of privileges in handling of eBPF programs",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-31440"
},
{
"category": "external",
"summary": "RHBZ#1964028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964028"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-31440",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31440"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31440",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31440"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=10bf4e83167cc68595b85fd73bb91e8f2c086e36",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=10bf4e83167cc68595b85fd73bb91e8f2c086e36"
},
{
"category": "external",
"summary": "https://www.zerodayinitiative.com/blog/2021/5/26/cve-2021-31440-an-incorrect-bounds-calculation-in-the-linux-kernel-ebpf-verifier",
"url": "https://www.zerodayinitiative.com/blog/2021/5/26/cve-2021-31440-an-incorrect-bounds-calculation-in-the-linux-kernel-ebpf-verifier"
}
],
"release_date": "2021-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: local escalation of privileges in handling of eBPF programs"
},
{
"cve": "CVE-2021-31829",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-05-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1957788"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u0027s eBPF verification code. By default, accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN. This flaw allows a local user who can insert eBPF instructions, to use the eBPF verifier to abuse a spectre-like flaw and infer all system memory. The highest threat from this vulnerability is to confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-31829"
},
{
"category": "external",
"summary": "RHBZ#1957788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1957788"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-31829",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31829"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31829",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31829"
}
],
"release_date": "2021-04-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 and 8 kernel to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory"
},
{
"cve": "CVE-2021-31916",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-03-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1946965"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel. A bound check failure allows an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash, a leak of internal kernel information, or a privilege escalation problem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out of bounds array access in drivers/md/dm-ioctl.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated a Low impact because in the default configuration, the issue can only be triggered by a privileged local user.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-31916"
},
{
"category": "external",
"summary": "RHBZ#1946965",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946965"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-31916",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31916"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31916",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31916"
},
{
"category": "external",
"summary": "https://github.com/torvalds/linux/commit/4edbe1d7bcffcd6269f3b5eb63f710393ff2ec7a",
"url": "https://github.com/torvalds/linux/commit/4edbe1d7bcffcd6269f3b5eb63f710393ff2ec7a"
},
{
"category": "external",
"summary": "https://seclists.org/oss-sec/2021/q1/268",
"url": "https://seclists.org/oss-sec/2021/q1/268"
}
],
"release_date": "2021-03-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: out of bounds array access in drivers/md/dm-ioctl.c"
},
{
"cve": "CVE-2021-33033",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961300"
}
],
"notes": [
{
"category": "description",
"text": "A flaw use-after-free in the Linux kernel CIPSO network packet labeling protocol functionality was found in the way user open local network connection with the usage of the security labeling that is IP option number 134. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Considered to be Moderate rate, because by default CIPSO non-enabled and both no known way to reproduce the attack remotely and both it looks complex if even possible to use the attack in any way apart from crashing the system. For the usage of the inbound CIPSO connections, the administrator have to enable it with netlabelctl utility first. The vulnerability is considered to be for local user, because it can happen only when a local user opens a socket for sending packets, but not during receiving packets.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33033"
},
{
"category": "external",
"summary": "RHBZ#1961300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961300"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33033",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33033"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33033",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33033"
}
],
"release_date": "2021-03-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "The mitigation would be not allowing CIPSO labeling for the inbound network connections. For the most of the default configurations both for network routers and for the Linux servers itself it is disabled by default.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c"
},
{
"cve": "CVE-2021-33200",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-05-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965458"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in kernel/bpf/verifier.c in BPF in the Linux kernel. An incorrect limit is enforced for pointer arithmetic operations which can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33200"
},
{
"category": "external",
"summary": "RHBZ#1965458",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965458"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33200",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33200"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33200",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33200"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=3d0220f6861d713213b015b582e9f21e5b28d2e0",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=3d0220f6861d713213b015b582e9f21e5b28d2e0"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=a7036191277f9fa68d92f2071ddc38c09b1e5ee5",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=a7036191277f9fa68d92f2071ddc38c09b1e5ee5"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=bb01a1bba579b4b1c5566af24d95f1767859771e",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=bb01a1bba579b4b1c5566af24d95f1767859771e"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/05/27/1",
"url": "https://www.openwall.com/lists/oss-security/2021/05/27/1"
}
],
"release_date": "2021-05-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier"
},
{
"cve": "CVE-2021-46905",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-02-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2266253"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel. This flaw occurs due to an unconditional NULL-pointer dereference on every disconnect in the Linux kernel.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: NULL-deref on disconnect regression",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-46905"
},
{
"category": "external",
"summary": "RHBZ#2266253",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266253"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-46905",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46905"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-46905",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-46905"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024022557-CVE-2021-46905-6507@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024022557-CVE-2021-46905-6507@gregkh/T"
}
],
"release_date": "2024-02-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: NULL-deref on disconnect regression"
},
{
"cve": "CVE-2022-20166",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-08-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2122089"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s sysfs layer. This flaw allows a local user who can read files under the /sysfs mount point to corrupt memory or possibly crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: possible buffer overflow in sysfs reading",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-20166"
},
{
"category": "external",
"summary": "RHBZ#2122089",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122089"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-20166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20166"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-20166",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-20166"
}
],
"release_date": "2022-08-15T14:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: possible buffer overflow in sysfs reading"
}
]
}
RHSA-2021:4140
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n* kernel: out-of-bounds reads in pinctrl subsystem. (CVE-2020-0427)\n* kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24502)\n* kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24503)\n* kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24504)\n* kernel: Fragmentation cache not cleared on reconnection (CVE-2020-24586)\n* kernel: Reassembling fragments encrypted under different keys (CVE-2020-24587)\n* kernel: wifi frame payload being parsed incorrectly as an L2 frame (CVE-2020-24588)\n* kernel: Forwarding EAPOL from unauthenticated wifi client (CVE-2020-26139)\n* kernel: accepting plaintext data frames in protected networks (CVE-2020-26140)\n* kernel: not verifying TKIP MIC of fragmented frames (CVE-2020-26141)\n* kernel: accepting fragmented plaintext frames in protected networks (CVE-2020-26143)\n* kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header (CVE-2020-26144)\n* kernel: accepting plaintext broadcast fragments as full frames (CVE-2020-26145)\n* kernel: locking inconsistency in tty_io.c and tty_jobctrl.c can lead to a read-after-free (CVE-2020-29660)\n* kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function via a long SSID value (CVE-2020-36158)\n* kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() (CVE-2020-36386)\n* kernel: Improper access control in BlueZ may allow information disclosure vulnerability. (CVE-2021-0129)\n* kernel: Use-after-free in ndb_queue_rq() (CVE-2021-3348)\n* kernel: Linux kernel eBPF RINGBUF map oversized allocation (CVE-2021-3489)\n* kernel: double free in bluetooth subsystem when the HCI device initialization fails (CVE-2021-3564)\n* kernel: use-after-free in function hci_sock_bound_ioctl() (CVE-2021-3573)\n* kernel: eBPF 32-bit source register truncation on div/mod (CVE-2021-3600)\n* kernel: DoS in rb_per_cpu_empty() (CVE-2021-3679)\n* kernel: overlayfs: Mounting overlayfs inside an unprivileged user namespace can reveal files (CVE-2021-3732)\n* kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt() (CVE-2021-20194)\n* kernel: Race condition in sctp_destroy_sock list_del (CVE-2021-23133)\n* kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode (CVE-2021-28950)\n* kernel: System crash in intel_pmu_drain_pebs_nhm (CVE-2021-28971)\n* kernel: protection for sequences of pointer arithmetic operations against speculatively out-of-bounds loads can be bypassed to leak content of kernel memory (CVE-2021-29155)\n* kernel: improper input validation in tipc_nl_retrieve_key function (CVE-2021-29646)\n* kernel: lack a full memory barrier upon the assignment of a new table value in x_tables.h may lead to DoS (CVE-2021-29650)\n* kernel: local escalation of privileges in handling of eBPF programs (CVE-2021-31440)\n* kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory (CVE-2021-31829)\n* kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier (CVE-2021-33200)\n* kernel: reassembling encrypted fragments with non-consecutive packet numbers (CVE-2020-26146)\n* kernel: reassembling mixed encrypted/plaintext fragments (CVE-2020-26147)\n* kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check (CVE-2020-29368)\n* kernel: flowtable list del corruption with kernel BUG (CVE-2021-3635)\n* kernel: NULL pointer dereference in llsec_key_alloc() (CVE-2021-3659)\n* kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure (CVE-2021-20239)\n* kernel: out of bounds array access in drivers/md/dm-ioctl.c (CVE-2021-31916)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:4140",
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/"
},
{
"category": "external",
"summary": "1875275",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1875275"
},
{
"category": "external",
"summary": "1902412",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902412"
},
{
"category": "external",
"summary": "1903244",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903244"
},
{
"category": "external",
"summary": "1905747",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905747"
},
{
"category": "external",
"summary": "1906522",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906522"
},
{
"category": "external",
"summary": "1912683",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912683"
},
{
"category": "external",
"summary": "1913348",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913348"
},
{
"category": "external",
"summary": "1919893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919893"
},
{
"category": "external",
"summary": "1921958",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921958"
},
{
"category": "external",
"summary": "1923636",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1923636"
},
{
"category": "external",
"summary": "1930376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930376"
},
{
"category": "external",
"summary": "1930379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930379"
},
{
"category": "external",
"summary": "1930381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930381"
},
{
"category": "external",
"summary": "1941762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941762"
},
{
"category": "external",
"summary": "1941784",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941784"
},
{
"category": "external",
"summary": "1945345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945345"
},
{
"category": "external",
"summary": "1945388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945388"
},
{
"category": "external",
"summary": "1946965",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946965"
},
{
"category": "external",
"summary": "1948772",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1948772"
},
{
"category": "external",
"summary": "1951595",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951595"
},
{
"category": "external",
"summary": "1957788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1957788"
},
{
"category": "external",
"summary": "1959559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959559"
},
{
"category": "external",
"summary": "1959642",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959642"
},
{
"category": "external",
"summary": "1959654",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959654"
},
{
"category": "external",
"summary": "1959657",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959657"
},
{
"category": "external",
"summary": "1959663",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959663"
},
{
"category": "external",
"summary": "1960490",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960490"
},
{
"category": "external",
"summary": "1960492",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960492"
},
{
"category": "external",
"summary": "1960496",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960496"
},
{
"category": "external",
"summary": "1960498",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960498"
},
{
"category": "external",
"summary": "1960500",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960500"
},
{
"category": "external",
"summary": "1960502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960502"
},
{
"category": "external",
"summary": "1960504",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960504"
},
{
"category": "external",
"summary": "1964028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964028"
},
{
"category": "external",
"summary": "1964139",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964139"
},
{
"category": "external",
"summary": "1965038",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965038"
},
{
"category": "external",
"summary": "1965458",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965458"
},
{
"category": "external",
"summary": "1966578",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966578"
},
{
"category": "external",
"summary": "1969489",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1969489"
},
{
"category": "external",
"summary": "1975949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975949"
},
{
"category": "external",
"summary": "1976946",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976946"
},
{
"category": "external",
"summary": "1981954",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981954"
},
{
"category": "external",
"summary": "1989165",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989165"
},
{
"category": "external",
"summary": "1995249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995249"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4140.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2025-10-10T02:11:17+00:00",
"generator": {
"date": "2025-10-10T02:11:17+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:4140",
"initial_release_date": "2021-11-09T17:26:23+00:00",
"revision_history": [
{
"date": "2021-11-09T17:26:23+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-11-09T17:26:23+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T02:11:17+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::nfv"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::realtime"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"product": {
"name": "kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"product_id": "kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-348.rt7.130.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-348.rt7.130.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-348.rt7.130.el8.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src"
},
"product_reference": "kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "NFV-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-348.rt7.130.el8.src as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src"
},
"product_reference": "kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"relates_to_product_reference": "RT-8.5.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-14615",
"cwe": {
"id": "CWE-212",
"name": "Improper Removal of Sensitive Information Before Storage or Transfer"
},
"discovery_date": "2020-01-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1789209"
}
],
"notes": [
{
"category": "description",
"text": "An information disclosure flaw was found in the Linux kernel. The i915 graphics driver lacks control of flow for data structures which may allow a local, authenticated user to disclose information when using ioctl commands with an attached i915 device. The highest threat from this vulnerability is to data confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Intel graphics card information leak.",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, 8 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 6, 7, and 8 may address this issue.\n\nThis has been rated as having Moderate security impact and is not currently planned to be addressed in future updates of Red Hat Enterprise MRG 2.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-14615"
},
{
"category": "external",
"summary": "RHBZ#1789209",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789209"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-14615",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14615"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14615",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14615"
}
],
"release_date": "2020-01-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Preventing loading of the i915 kernel module will prevent attackers from using this exploit against the system; however, the power management functionality of the card will be disabled and the system may draw additional power. See the kcs \u201cHow do I blacklist a kernel module to prevent it from loading automatically?\u201c (https://access.redhat.com/solutions/41278) for instructions on how to disable a kernel module from autoloading. Graphical displays may also be at low resolution or not work correctly.\n\nThis mitigation may not be suitable if the graphical login functionality is required.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Intel graphics card information leak."
},
{
"cve": "CVE-2020-0427",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-01-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1919893"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux pinctrl system. It is possible to trigger an of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds reads in pinctrl subsystem.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-0427"
},
{
"category": "external",
"summary": "RHBZ#1919893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919893"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-0427",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0427"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0427",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0427"
}
],
"release_date": "2020-11-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: out-of-bounds reads in pinctrl subsystem."
},
{
"cve": "CVE-2020-24502",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-02-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1930379"
}
],
"notes": [
{
"category": "description",
"text": "Improper input validation in some Intel(R) Ethernet E810 Adapter drivers for Linux may allow an authenticated user to potentially enable a denial of service via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24502"
},
{
"category": "external",
"summary": "RHBZ#1930379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930379"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24502",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24502"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24502",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24502"
}
],
"release_date": "2021-02-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers"
},
{
"cve": "CVE-2020-24503",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-02-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1930381"
}
],
"notes": [
{
"category": "description",
"text": "Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers for Linux may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24503"
},
{
"category": "external",
"summary": "RHBZ#1930381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930381"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24503",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24503"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24503",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24503"
}
],
"release_date": "2021-02-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers"
},
{
"cve": "CVE-2020-24504",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-02-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1930376"
}
],
"notes": [
{
"category": "description",
"text": "An uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers for Linux may allow an authenticated user to potentially cause a denial of service via local access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24504"
},
{
"category": "external",
"summary": "RHBZ#1930376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930376"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24504",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24504"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24504",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24504"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html"
}
],
"release_date": "2021-02-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers"
},
{
"cve": "CVE-2020-24586",
"cwe": {
"id": "CWE-212",
"name": "Improper Removal of Sensitive Information Before Storage or Transfer"
},
"discovery_date": "2021-05-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1959642"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernels implementation of wifi fragmentation handling. An attacker with the ability to transmit within the wireless transmission range of an access point can abuse a flaw where previous contents of wifi fragments can be unintentionally transmitted to another device.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Fragmentation cache not cleared on reconnection",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "RHBZ#1959642",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959642"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24586"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24586",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24586"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/"
}
],
"release_date": "2021-05-12T01:20:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Fragmentation cache not cleared on reconnection"
},
{
"cve": "CVE-2020-24587",
"cwe": {
"id": "CWE-345",
"name": "Insufficient Verification of Data Authenticity"
},
"discovery_date": "2021-05-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1959654"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u0027s WiFi implementation. An attacker within the wireless range can abuse a logic flaw in the WiFi implementation by reassembling packets from multiple fragments under different keys, treating them as valid. This flaw allows an attacker to send a fragment under an incorrect key, treating them as a valid fragment under the new key. The highest threat from this vulnerability is to confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Reassembling fragments encrypted under different keys",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "RHBZ#1959654",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959654"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24587",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24587"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24587",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24587"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/"
}
],
"release_date": "2021-05-11T14:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.1,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Reassembling fragments encrypted under different keys"
},
{
"cve": "CVE-2020-24588",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-05-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1959657"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernels wifi implementation. An attacker within wireless broadcast range can inject custom data into the wireless communication circumventing checks on the data. This can cause the frame to pass checks and be considered a valid frame of a different type.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: wifi frame payload being parsed incorrectly as an L2 frame",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "RHBZ#1959657",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959657"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-24588",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24588"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24588",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24588"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.25d93176ddaf.I9e265b597f2cd23eb44573f35b625947b386a9de@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.25d93176ddaf.I9e265b597f2cd23eb44573f35b625947b386a9de@changeid/"
}
],
"release_date": "2021-05-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: wifi frame payload being parsed incorrectly as an L2 frame"
},
{
"cve": "CVE-2020-26139",
"cwe": {
"id": "CWE-829",
"name": "Inclusion of Functionality from Untrusted Control Sphere"
},
"discovery_date": "2021-05-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1959663"
}
],
"notes": [
{
"category": "description",
"text": "Frames used for authentication and key management between the AP and connected clients. Some clients may take these redirected frames masquerading as control mechanisms from the AP.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Forwarding EAPOL from unauthenticated wifi client",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26139"
},
{
"category": "external",
"summary": "RHBZ#1959663",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959663"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26139"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26139",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26139"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.cb327ed0cabe.Ib7dcffa2a31f0913d660de65ba3c8aca75b1d10f@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.cb327ed0cabe.Ib7dcffa2a31f0913d660de65ba3c8aca75b1d10f@changeid/"
}
],
"release_date": "2021-05-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Forwarding EAPOL from unauthenticated wifi client"
},
{
"cve": "CVE-2020-26140",
"cwe": {
"id": "CWE-346",
"name": "Origin Validation Error"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960490"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Linux kernel. Where the WiFi implementations accept plaintext frames in a protected WiFi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: accepting plaintext data frames in protected networks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26140"
},
{
"category": "external",
"summary": "RHBZ#1960490",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960490"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26140",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26140"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26140",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26140"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: accepting plaintext data frames in protected networks"
},
{
"cve": "CVE-2020-26141",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960492"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Linux kernel\u0027s WiFi implementation. An attacker within wireless range can inject a control packet fragment where the kernel does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: not verifying TKIP MIC of fragmented frames",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "RHBZ#1960492",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960492"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26141"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26141",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26141"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.c3f1d42c6746.I795593fcaae941c471425b8c7d5f7bb185d29142@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.c3f1d42c6746.I795593fcaae941c471425b8c7d5f7bb185d29142@changeid/"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: not verifying TKIP MIC of fragmented frames"
},
{
"cve": "CVE-2020-26143",
"cwe": {
"id": "CWE-346",
"name": "Origin Validation Error"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960496"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Linux kernel, where the WiFi implementations assemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: accepting fragmented plaintext frames in protected networks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26143"
},
{
"category": "external",
"summary": "RHBZ#1960496",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960496"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26143",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26143"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26143",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26143"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: accepting fragmented plaintext frames in protected networks"
},
{
"cve": "CVE-2020-26144",
"cwe": {
"id": "CWE-290",
"name": "Authentication Bypass by Spoofing"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960498"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel, where the WiFi implementations accept plaintext A-MSDU frames as long as the first 8 bytes correspond to a valid RFC1042 (ex., LLC/SNAP) header for EAPOL. The highest threat from this vulnerability is to integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26144"
},
{
"category": "external",
"summary": "RHBZ#1960498",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960498"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26144",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26144"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26144",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26144"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header"
},
{
"cve": "CVE-2020-26145",
"cwe": {
"id": "CWE-307",
"name": "Improper Restriction of Excessive Authentication Attempts"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960500"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in ath10k_htt_rx_proc_rx_frag_ind_hl in drivers/net/wireless/ath/ath10k/htt_rx.c in the Linux kernel WiFi implementations, where it accepts a second (or subsequent) broadcast fragments even when sent in plaintext and then process them as full unfragmented frames. The highest threat from this vulnerability is to integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: accepting plaintext broadcast fragments as full frames",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26145"
},
{
"category": "external",
"summary": "RHBZ#1960500",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960500"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26145"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26145",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26145"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.9ca6ca7945a9.I1e18b514590af17c155bda86699bc3a971a8dcf4@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.9ca6ca7945a9.I1e18b514590af17c155bda86699bc3a971a8dcf4@changeid/"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: accepting plaintext broadcast fragments as full frames"
},
{
"cve": "CVE-2020-26146",
"cwe": {
"id": "CWE-307",
"name": "Improper Restriction of Excessive Authentication Attempts"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960502"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Linux kernel, where the WiFi implementation reassemble fragments with non-consecutive packet numbers. An adversary can abuse this to exfiltrate selected fragments. This vulnerability is exploitable when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used. Note that WEP is vulnerable to this attack by design.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: reassembling encrypted fragments with non-consecutive packet numbers",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26146"
},
{
"category": "external",
"summary": "RHBZ#1960502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960502"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26146"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26146",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26146"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: reassembling encrypted fragments with non-consecutive packet numbers"
},
{
"cve": "CVE-2020-26147",
"cwe": {
"id": "CWE-307",
"name": "Improper Restriction of Excessive Authentication Attempts"
},
"discovery_date": "2021-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1960504"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in ieee80211_rx_h_defragment in net/mac80211/rx.c in the Linux Kernel\u0027s WiFi implementation. This vulnerability can be abused to inject packets or exfiltrate selected fragments when another device sends fragmented frames, and the WEP, CCMP, or GCMP data-confidentiality protocol is used. The highest threat from this vulnerability is to integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: reassembling mixed encrypted/plaintext fragments",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-26147"
},
{
"category": "external",
"summary": "RHBZ#1960504",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960504"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26147",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26147"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-wireless/20210511200110.30c4394bb835.I5acfdb552cc1d20c339c262315950b3eac491397@changeid/",
"url": "https://lore.kernel.org/linux-wireless/20210511200110.30c4394bb835.I5acfdb552cc1d20c339c262315950b3eac491397@changeid/"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: reassembling mixed encrypted/plaintext fragments"
},
{
"cve": "CVE-2020-29368",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-12-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903244"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw has been rated as having Moderateimpact because, based on Red Hat\u0027s assessment, this issue is hard to exploit in practice because the race window is too small for it to be reliable.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-29368"
},
{
"category": "external",
"summary": "RHBZ#1903244",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903244"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-29368",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29368"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29368",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29368"
}
],
"release_date": "2020-06-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check"
},
{
"cve": "CVE-2020-29660",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2020-12-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1906522"
}
],
"notes": [
{
"category": "description",
"text": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel. A local user could use this flaw to read numerical value from memory after free.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: locking inconsistency in drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c can lead to a read-after-free",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having Low impact (Red Hat Enterprise Linux 7) because of the need to have CAP_SYS_TTY_CONFIG privileges.\n\nThis flaw is rated as having Moderate (Red Hat Enterprise Linux 8) impact because of the need to have CAP_SYS_TTY_CONFIG privileges. Red Hat Enterprise Linux 8 enabled unprivileged user/network namespaces by default which can be used to exercise this vulnerability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-29660"
},
{
"category": "external",
"summary": "RHBZ#1906522",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906522"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-29660",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29660"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29660",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29660"
}
],
"release_date": "2020-12-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: locking inconsistency in drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c can lead to a read-after-free"
},
{
"cve": "CVE-2020-36158",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2021-01-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1913348"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. The marvell wifi driver could allow a local attacker to execute arbitrary code via a long SSID value in mwifiex_cmd_802_11_ad_hoc_start function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function in drivers/net/wireless/marvell/mwifiex/join.c via a long SSID value",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having Moderate impact because the attacker needs to be local and privileged enough to be able to initiate ad-hoc WIFI network creation.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36158"
},
{
"category": "external",
"summary": "RHBZ#1913348",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913348"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36158",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36158"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36158",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36158"
}
],
"release_date": "2020-12-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module mwifiex from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function in drivers/net/wireless/marvell/mwifiex/join.c via a long SSID value"
},
{
"cve": "CVE-2020-36312",
"cwe": {
"id": "CWE-772",
"name": "Missing Release of Resource after Effective Lifetime"
},
"discovery_date": "2021-04-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1947991"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the KVM hypervisor of the Linux kernel. A memory leak could occur in kvm_io_bus_unregister_dev() upon a kmalloc failure. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: memory leak upon a kmalloc failure in kvm_io_bus_unregister_dev function in virt/kvm/kvm_main.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36312"
},
{
"category": "external",
"summary": "RHBZ#1947991",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1947991"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36312",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36312"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36312",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36312"
}
],
"release_date": "2020-09-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: memory leak upon a kmalloc failure in kvm_io_bus_unregister_dev function in virt/kvm/kvm_main.c"
},
{
"cve": "CVE-2020-36386",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2021-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1969489"
}
],
"notes": [
{
"category": "description",
"text": "A flaw out of bounds memory access in the Linux kernel bluetooth subsystem was found in the way when some data being read about the bluetooth device with the hci_extended_inquiry_result_evt call. A local user could use this flaw to crash the system or read some data out of memory bounds that can lead to data confidentiality threat.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() in net/bluetooth/hci_event.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having a Moderate impact because even the data being read out of memory bounds is written to some cache, it was known before that this data from non-safe source and as result no any sensitive dependencies on this data.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36386"
},
{
"category": "external",
"summary": "RHBZ#1969489",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1969489"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36386",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36386"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36386",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36386"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51c19bf3d5cfaa66571e4b88ba2a6f6295311101",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51c19bf3d5cfaa66571e4b88ba2a6f6295311101"
}
],
"release_date": "2020-07-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module bluetooth from being loaded (if Bluetooth not required for the system). Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() in net/bluetooth/hci_event.c"
},
{
"cve": "CVE-2021-0129",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965038"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access. The highest threat from this vulnerability is to data confidentiality and integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper access control in BlueZ may allow information disclosure vulnerability.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0129"
},
{
"category": "external",
"summary": "RHBZ#1965038",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965038"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0129"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0129",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0129"
}
],
"release_date": "2021-06-08T03:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Improper access control in BlueZ may allow information disclosure vulnerability."
},
{
"cve": "CVE-2021-3348",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-01-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1921958"
}
],
"notes": [
{
"category": "description",
"text": "A use after free flaw in the Linux kernel network block device (NBD) subsystem was found in the way user calls an ioctl NBD_SET_SOCK at a certain point during device setup.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use-after-free in ndb_queue_rq() in drivers/block/nbd.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having a Moderate impact because in the default configuration, the issue can only be triggered by a privileged local user (with access to the nbd device).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3348"
},
{
"category": "external",
"summary": "RHBZ#1921958",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921958"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3348",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3348"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3348",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3348"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-block/24dff677353e2e30a71d8b66c4dffdbdf77c4dbd.1611595239.git.josef@toxicpanda.com/",
"url": "https://lore.kernel.org/linux-block/24dff677353e2e30a71d8b66c4dffdbdf77c4dbd.1611595239.git.josef@toxicpanda.com/"
}
],
"release_date": "2021-01-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module nbd from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Use-after-free in ndb_queue_rq() in drivers/block/nbd.c"
},
{
"acknowledgments": [
{
"names": [
"Ryota Shiga"
]
}
],
"cve": "CVE-2021-3489",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1959559"
}
],
"notes": [
{
"category": "description",
"text": "A flaw out of bound memory write in the Linux kernel BPF subsystem was found in the way user writes to BPF ring buffer too fast, so larger buffer than available memory could be allocated. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Linux kernel eBPF RINGBUF map oversized allocation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3489"
},
{
"category": "external",
"summary": "RHBZ#1959559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959559"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3489",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3489"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3489",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3489"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=4b81ccebaeee885ab1aa1438133f2991e3a2b6ea",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=4b81ccebaeee885ab1aa1438133f2991e3a2b6ea"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/05/11/10",
"url": "https://www.openwall.com/lists/oss-security/2021/05/11/10"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Linux kernel eBPF RINGBUF map oversized allocation"
},
{
"acknowledgments": [
{
"names": [
"HaoXiong, LinMa"
],
"organization": "ckSec"
}
],
"cve": "CVE-2021-3564",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"discovery_date": "2021-05-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1964139"
}
],
"notes": [
{
"category": "description",
"text": "A flaw double-free memory corruption in the Linux kernel HCI device initialization subsystem was found in the way user attach malicious HCI TTY Bluetooth device. A local user could use this flaw to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: double free in bluetooth subsystem when the HCI device initialization fails",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The impact is Moderate, because the double free happens during flush procedure, and no use of incorrect data during flush finishing even if double free could happen without kernel crash.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3564"
},
{
"category": "external",
"summary": "RHBZ#1964139",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964139"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3564"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3564",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3564"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/05/25/1",
"url": "https://www.openwall.com/lists/oss-security/2021/05/25/1"
}
],
"release_date": "2021-05-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: double free in bluetooth subsystem when the HCI device initialization fails"
},
{
"cve": "CVE-2021-3573",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1966578"
}
],
"notes": [
{
"category": "description",
"text": "A flaw use-after-free in function hci_sock_bound_ioctl() of the Linux kernel HCI subsystem was found in the way user calls ioct HCIUNBLOCKADDR or other way triggers race condition of the call hci_unregister_dev() together with one of the calls hci_sock_blacklist_add(), hci_sock_blacklist_del(), hci_get_conn_info(), hci_get_auth_info(). A privileged local user could use this flaw to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in function hci_sock_bound_ioctl()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having a Moderate impact because of the privileges (CAP_NET_ADMIN in initial namespace) required for exploiting the issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3573"
},
{
"category": "external",
"summary": "RHBZ#1966578",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966578"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3573",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3573"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth.git/commit/?id=e305509e678b3a4af2b3cfd410f409f7cdaabb52",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth.git/commit/?id=e305509e678b3a4af2b3cfd410f409f7cdaabb52"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/06/08/2",
"url": "https://www.openwall.com/lists/oss-security/2021/06/08/2"
}
],
"release_date": "2021-06-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising easThe required privileges is CAP_NET_ADMIN capabilities. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.e of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in function hci_sock_bound_ioctl()"
},
{
"cve": "CVE-2021-3600",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1981954"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s eBPF verification code, where the eBPF 32-bit div/mod source register truncation could lead to out-of-bounds reads and writes. By default, accessing the eBPF verifier is only possible to privileged users with CAP_SYS_ADMIN. This flaw allows a local user who can run eBPF instructions to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: eBPF 32-bit source register truncation on div/mod",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3600"
},
{
"category": "external",
"summary": "RHBZ#1981954",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981954"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3600"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3600",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3600"
},
{
"category": "external",
"summary": "https://lore.kernel.org/patchwork/patch/1379497/",
"url": "https://lore.kernel.org/patchwork/patch/1379497/"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/06/23/1",
"url": "https://www.openwall.com/lists/oss-security/2021/06/23/1"
}
],
"release_date": "2021-06-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: eBPF 32-bit source register truncation on div/mod"
},
{
"cve": "CVE-2021-3635",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-06-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1976946"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel netfilter implementation. A user with root (CAP_SYS_ADMIN) access is able to panic the system when issuing netfilter netflow commands",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: flowtable list del corruption with kernel BUG at lib/list_debug.c:50",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3635"
},
{
"category": "external",
"summary": "RHBZ#1976946",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976946"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3635",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3635"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3635",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3635"
}
],
"release_date": "2021-08-06T04:47:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: flowtable list del corruption with kernel BUG at lib/list_debug.c:50"
},
{
"cve": "CVE-2021-3659",
"cwe": {
"id": "CWE-252",
"name": "Unchecked Return Value"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1975949"
}
],
"notes": [
{
"category": "description",
"text": "A NULL pointer dereference flaw was found in the Linux kernel\u2019s IEEE 802.15.4 wireless networking subsystem in the way the user closes the LR-WPAN connection. This flaw allows a local user to crash the system. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3659"
},
{
"category": "external",
"summary": "RHBZ#1975949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975949"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3659",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3659"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3659",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3659"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8"
}
],
"release_date": "2021-04-06T19:22:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module mac802154 from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c"
},
{
"acknowledgments": [
{
"names": [
"Haoran Luo"
],
"organization": "Chaitin Tech"
}
],
"cve": "CVE-2021-3679",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-07-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1989165"
}
],
"notes": [
{
"category": "description",
"text": "A lack of CPU resources in the Linux kernel tracing module functionality was found in the way users use the trace ring buffer in specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: DoS in rb_per_cpu_empty()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3679"
},
{
"category": "external",
"summary": "RHBZ#1989165",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989165"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3679",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3679"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3679",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3679"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20210723125527.767d1c18@oasis.local.home/",
"url": "https://lore.kernel.org/lkml/20210723125527.767d1c18@oasis.local.home/"
}
],
"release_date": "2021-07-20T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: DoS in rb_per_cpu_empty()"
},
{
"acknowledgments": [
{
"names": [
"Miklos Szeredi"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2021-3732",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-08-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1995249"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s OverlayFS subsystem in the way the user mounts the TmpFS filesystem with OverlayFS. This flaw allows a local user to gain access to hidden files that should not be accessible.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: overlayfs: Mounting overlayfs inside an unprivileged user namespace can reveal files",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3732"
},
{
"category": "external",
"summary": "RHBZ#1995249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995249"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3732",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3732"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3732",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3732"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=427215d85e8d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=427215d85e8d"
}
],
"release_date": "2021-08-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: overlayfs: Mounting overlayfs inside an unprivileged user namespace can reveal files"
},
{
"acknowledgments": [
{
"names": [
"Loris Reiff"
]
}
],
"cve": "CVE-2021-20194",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2020-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1912683"
}
],
"notes": [
{
"category": "description",
"text": "A flaw buffer overflow in the Linux kernel BPF subsystem was found in the way user running BPF script calling getsockopt. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having Moderate impact because of the need to have elevated privileges or non-standard configuration for running BPF script.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-20194"
},
{
"category": "external",
"summary": "RHBZ#1912683",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912683"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-20194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20194"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20194",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20194"
}
],
"release_date": "2021-01-22T10:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\n\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt()"
},
{
"cve": "CVE-2021-20239",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1923636"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the BPF protocol. This flaw allows an attacker with a local account to leak information about kernel internal addresses. The highest threat from this vulnerability is to confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-20239"
},
{
"category": "external",
"summary": "RHBZ#1923636",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1923636"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-20239",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20239"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20239",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20239"
}
],
"release_date": "2021-02-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Loading a filter is a privileged (CAP_SYS_ADMIN or root) operation. Once any filter is used, this attack is capable of being used by an unprivileged user. There is no known mitigation that product security finds suitable for this flaw.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.8,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure"
},
{
"acknowledgments": [
{
"names": [
"Or Cohen"
],
"organization": "Palo Alto Networks"
}
],
"cve": "CVE-2021-23133",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-04-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1948772"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s SCTP socket functionality that triggers a race condition. This flaw allows a local user to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Race condition in sctp_destroy_sock list_del",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having a Moderate impact because of the privileges required for running the known reproducer. The required privileges are CAP_BPF and CAP_NET_ADMIN capabilities that are disabled by default in Red Hat Enterprise Linux 7. For Red Hat Enterprise Linux 8, the SCTP protocol itself is disabled by default and cannot be used by a user without enablement by an administrator.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-23133"
},
{
"category": "external",
"summary": "RHBZ#1948772",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1948772"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23133"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23133",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23133"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b"
}
],
"release_date": "2021-04-18T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module sctp from being loaded (and this is so by default for Red Hat Enterprise Linux 8). Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Race condition in sctp_destroy_sock list_del"
},
{
"cve": "CVE-2021-28950",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2021-03-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1941762"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service in the kernel side of the FUSE functionality can allow a local system to create a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-28950"
},
{
"category": "external",
"summary": "RHBZ#1941762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941762"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-28950",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28950"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-28950",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-28950"
}
],
"release_date": "2021-03-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "As the FUSE module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install fuse /bin/true\" \u003e\u003e /etc/modprobe.d/disable-fuse.conf\n\nThe system will need to be restarted if the FUSE modules are loaded. In most circumstances, the CIFS kernel modules will be unable to be unloaded while the FUSE filesystems are in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode"
},
{
"cve": "CVE-2021-28971",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2021-03-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1941784"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. On some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: System crash in intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-28971"
},
{
"category": "external",
"summary": "RHBZ#1941784",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941784"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-28971",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28971"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-28971",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-28971"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: System crash in intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c"
},
{
"cve": "CVE-2021-29155",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2021-04-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1951595"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was discovered in retrieve_ptr_limit in kernel/bpf/verifier.c in the Linux kernel mechanism to mitigate speculatively out-of-bounds loads (Spectre mitigation). In this flaw a local, special user privileged (CAP_SYS_ADMIN) BPF program running on affected systems may bypass the protection, and execute speculatively out-of-bounds loads from the kernel memory. This can be abused to extract contents of kernel memory via side-channel.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: protection for sequences of pointer arithmetic operations against speculatively out-of-bounds loads can be bypassed to leak content of kernel memory",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29155"
},
{
"category": "external",
"summary": "RHBZ#1951595",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951595"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29155"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29155",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29155"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/04/18/4",
"url": "https://www.openwall.com/lists/oss-security/2021/04/18/4"
}
],
"release_date": "2021-04-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: protection for sequences of pointer arithmetic operations against speculatively out-of-bounds loads can be bypassed to leak content of kernel memory"
},
{
"cve": "CVE-2021-29646",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-03-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1945345"
}
],
"notes": [
{
"category": "description",
"text": "A flaw buffer overflow in the Linux kernel TIPC protocol functionality was found in the way user uses protocol with encryption enabled. A local user could use this flaw to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: improper input validation in tipc_nl_retrieve_key function in net/tipc/node.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29646"
},
{
"category": "external",
"summary": "RHBZ#1945345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945345"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29646",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29646"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29646",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29646"
}
],
"release_date": "2021-03-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: improper input validation in tipc_nl_retrieve_key function in net/tipc/node.c"
},
{
"cve": "CVE-2021-29650",
"cwe": {
"id": "CWE-662",
"name": "Improper Synchronization"
},
"discovery_date": "2021-03-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1945388"
}
],
"notes": [
{
"category": "description",
"text": "A denial-of-service (DoS) flaw was identified in the Linux kernel due to an incorrect memory barrier in xt_replace_table in net/netfilter/x_tables.c in the netfilter subsystem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29650"
},
{
"category": "external",
"summary": "RHBZ#1945388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945388"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29650",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29650"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1"
}
],
"release_date": "2021-03-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS"
},
{
"acknowledgments": [
{
"names": [
"Manfred Paul"
],
"organization": "RedRocket CTF team"
}
],
"cve": "CVE-2021-31440",
"cwe": {
"id": "CWE-682",
"name": "Incorrect Calculation"
},
"discovery_date": "2021-05-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1964028"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds access flaw was found in the Linux kernel\u2019s implementation of the eBPF code verifier, where an incorrect register bounds calculation while checking unsigned 32-bit instructions in an eBPF program occurs.. By default accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN. The issue results from the lack of proper validation of user-supplied eBPF programs prior to executing them. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: local escalation of privileges in handling of eBPF programs",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-31440"
},
{
"category": "external",
"summary": "RHBZ#1964028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964028"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-31440",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31440"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31440",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31440"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=10bf4e83167cc68595b85fd73bb91e8f2c086e36",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=10bf4e83167cc68595b85fd73bb91e8f2c086e36"
},
{
"category": "external",
"summary": "https://www.zerodayinitiative.com/blog/2021/5/26/cve-2021-31440-an-incorrect-bounds-calculation-in-the-linux-kernel-ebpf-verifier",
"url": "https://www.zerodayinitiative.com/blog/2021/5/26/cve-2021-31440-an-incorrect-bounds-calculation-in-the-linux-kernel-ebpf-verifier"
}
],
"release_date": "2021-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: local escalation of privileges in handling of eBPF programs"
},
{
"cve": "CVE-2021-31829",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-05-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1957788"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u0027s eBPF verification code. By default, accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN. This flaw allows a local user who can insert eBPF instructions, to use the eBPF verifier to abuse a spectre-like flaw and infer all system memory. The highest threat from this vulnerability is to confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-31829"
},
{
"category": "external",
"summary": "RHBZ#1957788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1957788"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-31829",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31829"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31829",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31829"
}
],
"release_date": "2021-04-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 and 8 kernel to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory"
},
{
"cve": "CVE-2021-31916",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-03-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1946965"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel. A bound check failure allows an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash, a leak of internal kernel information, or a privilege escalation problem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out of bounds array access in drivers/md/dm-ioctl.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated a Low impact because in the default configuration, the issue can only be triggered by a privileged local user.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-31916"
},
{
"category": "external",
"summary": "RHBZ#1946965",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946965"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-31916",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31916"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31916",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31916"
},
{
"category": "external",
"summary": "https://github.com/torvalds/linux/commit/4edbe1d7bcffcd6269f3b5eb63f710393ff2ec7a",
"url": "https://github.com/torvalds/linux/commit/4edbe1d7bcffcd6269f3b5eb63f710393ff2ec7a"
},
{
"category": "external",
"summary": "https://seclists.org/oss-sec/2021/q1/268",
"url": "https://seclists.org/oss-sec/2021/q1/268"
}
],
"release_date": "2021-03-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: out of bounds array access in drivers/md/dm-ioctl.c"
},
{
"cve": "CVE-2021-33033",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961300"
}
],
"notes": [
{
"category": "description",
"text": "A flaw use-after-free in the Linux kernel CIPSO network packet labeling protocol functionality was found in the way user open local network connection with the usage of the security labeling that is IP option number 134. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Considered to be Moderate rate, because by default CIPSO non-enabled and both no known way to reproduce the attack remotely and both it looks complex if even possible to use the attack in any way apart from crashing the system. For the usage of the inbound CIPSO connections, the administrator have to enable it with netlabelctl utility first. The vulnerability is considered to be for local user, because it can happen only when a local user opens a socket for sending packets, but not during receiving packets.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33033"
},
{
"category": "external",
"summary": "RHBZ#1961300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961300"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33033",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33033"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33033",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33033"
}
],
"release_date": "2021-03-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "The mitigation would be not allowing CIPSO labeling for the inbound network connections. For the most of the default configurations both for network routers and for the Linux servers itself it is disabled by default.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c"
},
{
"cve": "CVE-2021-33200",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-05-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965458"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in kernel/bpf/verifier.c in BPF in the Linux kernel. An incorrect limit is enforced for pointer arithmetic operations which can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33200"
},
{
"category": "external",
"summary": "RHBZ#1965458",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965458"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33200",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33200"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33200",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33200"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=3d0220f6861d713213b015b582e9f21e5b28d2e0",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=3d0220f6861d713213b015b582e9f21e5b28d2e0"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=a7036191277f9fa68d92f2071ddc38c09b1e5ee5",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=a7036191277f9fa68d92f2071ddc38c09b1e5ee5"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=bb01a1bba579b4b1c5566af24d95f1767859771e",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=bb01a1bba579b4b1c5566af24d95f1767859771e"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/05/27/1",
"url": "https://www.openwall.com/lists/oss-security/2021/05/27/1"
}
],
"release_date": "2021-05-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier"
},
{
"cve": "CVE-2021-46905",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-02-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2266253"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel. This flaw occurs due to an unconditional NULL-pointer dereference on every disconnect in the Linux kernel.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: NULL-deref on disconnect regression",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-46905"
},
{
"category": "external",
"summary": "RHBZ#2266253",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266253"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-46905",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46905"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-46905",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-46905"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024022557-CVE-2021-46905-6507@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024022557-CVE-2021-46905-6507@gregkh/T"
}
],
"release_date": "2024-02-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: NULL-deref on disconnect regression"
},
{
"cve": "CVE-2022-20166",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-08-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2122089"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s sysfs layer. This flaw allows a local user who can read files under the /sysfs mount point to corrupt memory or possibly crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: possible buffer overflow in sysfs reading",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-20166"
},
{
"category": "external",
"summary": "RHBZ#2122089",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122089"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-20166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20166"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-20166",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-20166"
}
],
"release_date": "2022-08-15T14:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-09T17:26:23+00:00",
"details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src",
"RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64",
"RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: possible buffer overflow in sysfs reading"
}
]
}
ghsa-c6qp-cf89-h54c
Vulnerability from github
An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.
{
"affected": [],
"aliases": [
"CVE-2020-26145"
],
"database_specific": {
"cwe_ids": [
"CWE-20"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2021-05-11T20:15:00Z",
"severity": "MODERATE"
},
"details": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.",
"id": "GHSA-c6qp-cf89-h54c",
"modified": "2022-05-24T19:01:57Z",
"published": "2022-05-24T19:01:57Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26145"
},
{
"type": "WEB",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf"
},
{
"type": "WEB",
"url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md"
},
{
"type": "WEB",
"url": "https://www.fragattacks.com"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2021/05/11/12"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"type": "CVSS_V3"
}
]
}
wid-sec-w-2025-1522
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren oder nicht spezifizierte Auswirkungen zu verursachen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-1522 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1522.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-1522 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1522"
},
{
"category": "external",
"summary": "Kernel CVE Announce Mailingliste",
"url": "https://lore.kernel.org/linux-cve-announce/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38265",
"url": "https://lore.kernel.org/linux-cve-announce/2025071035-CVE-2025-38265-be37@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38266",
"url": "https://lore.kernel.org/linux-cve-announce/2025071037-CVE-2025-38266-c33c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38267",
"url": "https://lore.kernel.org/linux-cve-announce/2025071007-CVE-2025-38267-2f0c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38268",
"url": "https://lore.kernel.org/linux-cve-announce/2025071007-CVE-2025-38268-3f41@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38269",
"url": "https://lore.kernel.org/linux-cve-announce/2025071007-CVE-2025-38269-fb65@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38270",
"url": "https://lore.kernel.org/linux-cve-announce/2025071008-CVE-2025-38270-c7b0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38271",
"url": "https://lore.kernel.org/linux-cve-announce/2025071008-CVE-2025-38271-5db2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38272",
"url": "https://lore.kernel.org/linux-cve-announce/2025071008-CVE-2025-38272-2f33@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38273",
"url": "https://lore.kernel.org/linux-cve-announce/2025071008-CVE-2025-38273-6850@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38274",
"url": "https://lore.kernel.org/linux-cve-announce/2025071008-CVE-2025-38274-087f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38275",
"url": "https://lore.kernel.org/linux-cve-announce/2025071008-CVE-2025-38275-4db0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38276",
"url": "https://lore.kernel.org/linux-cve-announce/2025071009-CVE-2025-38276-fb95@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38277",
"url": "https://lore.kernel.org/linux-cve-announce/2025071009-CVE-2025-38277-520c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38278",
"url": "https://lore.kernel.org/linux-cve-announce/2025071009-CVE-2025-38278-2d3a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38279",
"url": "https://lore.kernel.org/linux-cve-announce/2025071009-CVE-2025-38279-af9f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38280",
"url": "https://lore.kernel.org/linux-cve-announce/2025071009-CVE-2025-38280-86b4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38281",
"url": "https://lore.kernel.org/linux-cve-announce/2025071009-CVE-2025-38281-ec50@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38282",
"url": "https://lore.kernel.org/linux-cve-announce/2025071010-CVE-2025-38282-78a1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38283",
"url": "https://lore.kernel.org/linux-cve-announce/2025071010-CVE-2025-38283-a62b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38284",
"url": "https://lore.kernel.org/linux-cve-announce/2025071010-CVE-2025-38284-1574@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38285",
"url": "https://lore.kernel.org/linux-cve-announce/2025071010-CVE-2025-38285-f415@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38286",
"url": "https://lore.kernel.org/linux-cve-announce/2025071010-CVE-2025-38286-eab7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38287",
"url": "https://lore.kernel.org/linux-cve-announce/2025071011-CVE-2025-38287-b0ff@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38288",
"url": "https://lore.kernel.org/linux-cve-announce/2025071011-CVE-2025-38288-5c5a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38289",
"url": "https://lore.kernel.org/linux-cve-announce/2025071011-CVE-2025-38289-0d93@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38290",
"url": "https://lore.kernel.org/linux-cve-announce/2025071011-CVE-2025-38290-36c3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38291",
"url": "https://lore.kernel.org/linux-cve-announce/2025071011-CVE-2025-38291-25a9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38292",
"url": "https://lore.kernel.org/linux-cve-announce/2025071011-CVE-2025-38292-e03a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38293",
"url": "https://lore.kernel.org/linux-cve-announce/2025071012-CVE-2025-38293-8e77@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38294",
"url": "https://lore.kernel.org/linux-cve-announce/2025071012-CVE-2025-38294-bc36@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38295",
"url": "https://lore.kernel.org/linux-cve-announce/2025071012-CVE-2025-38295-da67@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38296",
"url": "https://lore.kernel.org/linux-cve-announce/2025071012-CVE-2025-38296-1670@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38297",
"url": "https://lore.kernel.org/linux-cve-announce/2025071012-CVE-2025-38297-9dee@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38298",
"url": "https://lore.kernel.org/linux-cve-announce/2025071012-CVE-2025-38298-25d2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38299",
"url": "https://lore.kernel.org/linux-cve-announce/2025071013-CVE-2025-38299-c973@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38300",
"url": "https://lore.kernel.org/linux-cve-announce/2025071013-CVE-2025-38300-f040@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38301",
"url": "https://lore.kernel.org/linux-cve-announce/2025071013-CVE-2025-38301-694f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38302",
"url": "https://lore.kernel.org/linux-cve-announce/2025071013-CVE-2025-38302-b915@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38303",
"url": "https://lore.kernel.org/linux-cve-announce/2025071013-CVE-2025-38303-b6ab@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38304",
"url": "https://lore.kernel.org/linux-cve-announce/2025071013-CVE-2025-38304-d021@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38305",
"url": "https://lore.kernel.org/linux-cve-announce/2025071014-CVE-2025-38305-4ad3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38306",
"url": "https://lore.kernel.org/linux-cve-announce/2025071014-CVE-2025-38306-66ae@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38307",
"url": "https://lore.kernel.org/linux-cve-announce/2025071014-CVE-2025-38307-fe9d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38308",
"url": "https://lore.kernel.org/linux-cve-announce/2025071014-CVE-2025-38308-68c9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38309",
"url": "https://lore.kernel.org/linux-cve-announce/2025071014-CVE-2025-38309-9638@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38310",
"url": "https://lore.kernel.org/linux-cve-announce/2025071014-CVE-2025-38310-6184@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38311",
"url": "https://lore.kernel.org/linux-cve-announce/2025071015-CVE-2025-38311-2a53@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38312",
"url": "https://lore.kernel.org/linux-cve-announce/2025071015-CVE-2025-38312-8693@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38313",
"url": "https://lore.kernel.org/linux-cve-announce/2025071015-CVE-2025-38313-4e5a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38314",
"url": "https://lore.kernel.org/linux-cve-announce/2025071015-CVE-2025-38314-5977@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38315",
"url": "https://lore.kernel.org/linux-cve-announce/2025071015-CVE-2025-38315-ccfc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38316",
"url": "https://lore.kernel.org/linux-cve-announce/2025071015-CVE-2025-38316-2087@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38317",
"url": "https://lore.kernel.org/linux-cve-announce/2025071016-CVE-2025-38317-efbf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38318",
"url": "https://lore.kernel.org/linux-cve-announce/2025071016-CVE-2025-38318-81bc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38319",
"url": "https://lore.kernel.org/linux-cve-announce/2025071016-CVE-2025-38319-de26@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38320",
"url": "https://lore.kernel.org/linux-cve-announce/2025071029-CVE-2025-38320-4e71@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38321",
"url": "https://lore.kernel.org/linux-cve-announce/2025071031-CVE-2025-38321-25aa@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38322",
"url": "https://lore.kernel.org/linux-cve-announce/2025071031-CVE-2025-38322-810a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38323",
"url": "https://lore.kernel.org/linux-cve-announce/2025071032-CVE-2025-38323-840c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38324",
"url": "https://lore.kernel.org/linux-cve-announce/2025071032-CVE-2025-38324-1d1d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38325",
"url": "https://lore.kernel.org/linux-cve-announce/2025071032-CVE-2025-38325-9f7c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38326",
"url": "https://lore.kernel.org/linux-cve-announce/2025071032-CVE-2025-38326-6186@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38327",
"url": "https://lore.kernel.org/linux-cve-announce/2025071032-CVE-2025-38327-67ca@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38328",
"url": "https://lore.kernel.org/linux-cve-announce/2025071032-CVE-2025-38328-43bf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38329",
"url": "https://lore.kernel.org/linux-cve-announce/2025071033-CVE-2025-38329-b96c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38330",
"url": "https://lore.kernel.org/linux-cve-announce/2025071033-CVE-2025-38330-bc1d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38331",
"url": "https://lore.kernel.org/linux-cve-announce/2025071033-CVE-2025-38331-aad6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38332",
"url": "https://lore.kernel.org/linux-cve-announce/2025071033-CVE-2025-38332-9590@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38333",
"url": "https://lore.kernel.org/linux-cve-announce/2025071033-CVE-2025-38333-a60d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38334",
"url": "https://lore.kernel.org/linux-cve-announce/2025071033-CVE-2025-38334-0d45@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38335",
"url": "https://lore.kernel.org/linux-cve-announce/2025071034-CVE-2025-38335-b96e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38336",
"url": "https://lore.kernel.org/linux-cve-announce/2025071034-CVE-2025-38336-ab73@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38337",
"url": "https://lore.kernel.org/linux-cve-announce/2025071034-CVE-2025-38337-6673@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38338",
"url": "https://lore.kernel.org/linux-cve-announce/2025071034-CVE-2025-38338-6aa1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38339",
"url": "https://lore.kernel.org/linux-cve-announce/2025071034-CVE-2025-38339-90f8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38340",
"url": "https://lore.kernel.org/linux-cve-announce/2025071034-CVE-2025-38340-bd10@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38341",
"url": "https://lore.kernel.org/linux-cve-announce/2025071035-CVE-2025-38341-7446@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38342",
"url": "https://lore.kernel.org/linux-cve-announce/2025071035-CVE-2025-38342-9e31@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38343",
"url": "https://lore.kernel.org/linux-cve-announce/2025071035-CVE-2025-38343-9a3b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38344",
"url": "https://lore.kernel.org/linux-cve-announce/2025071035-CVE-2025-38344-69d8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38345",
"url": "https://lore.kernel.org/linux-cve-announce/2025071035-CVE-2025-38345-ef5c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38346",
"url": "https://lore.kernel.org/linux-cve-announce/2025071035-CVE-2025-38346-8cb6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38347",
"url": "https://lore.kernel.org/linux-cve-announce/2025071036-CVE-2025-38347-0116@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-38348",
"url": "https://lore.kernel.org/linux-cve-announce/2025071036-CVE-2025-38348-ffc7@gregkh/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02588-1 vom 2025-08-01",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VQYPF6FAXKWBHQ4POBUPZVPW4L73XJR5/"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.10-2025-098 vom 2025-08-05",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2025-098.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2025-2955 vom 2025-08-05",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-2955.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:13602 vom 2025-08-11",
"url": "https://access.redhat.com/errata/RHSA-2025:13602"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:13598 vom 2025-08-11",
"url": "https://access.redhat.com/errata/RHSA-2025:13598"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5973 vom 2025-08-12",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00137.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-13602 vom 2025-08-14",
"url": "https://linux.oracle.com/errata/ELSA-2025-13602.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5975 vom 2025-08-13",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00139.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-13598 vom 2025-08-15",
"url": "https://linux.oracle.com/errata/ELSA-2025-13598.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14003 vom 2025-08-18",
"url": "https://access.redhat.com/errata/RHSA-2025:14003"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02853-1 vom 2025-08-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022200.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14005 vom 2025-08-18",
"url": "https://access.redhat.com/errata/RHSA-2025:14005"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02846-1 vom 2025-08-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022192.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02923-1 vom 2025-08-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022237.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02969-1 vom 2025-08-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022259.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02996-1 vom 2025-08-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02997-1 vom 2025-08-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022283.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20586-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022295.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20577-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03011-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022327.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20601-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03023-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022329.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20602-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022362.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15008 vom 2025-09-02",
"url": "https://access.redhat.com/errata/RHSA-2025:15008"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-15008 vom 2025-09-04",
"url": "https://linux.oracle.com/errata/ELSA-2025-15008.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20552 vom 2025-09-09",
"url": "https://linux.oracle.com/errata/ELSA-2025-20552.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20551 vom 2025-09-09",
"url": "https://linux.oracle.com/errata/ELSA-2025-20551.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20553 vom 2025-09-10",
"url": "https://linux.oracle.com/errata/ELSA-2025-20553.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15649 vom 2025-09-10",
"url": "https://access.redhat.com/errata/RHSA-2025:15649"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15646 vom 2025-09-10",
"url": "https://access.redhat.com/errata/RHSA-2025:15646"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15668 vom 2025-09-11",
"url": "https://access.redhat.com/errata/RHSA-2025:15668"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15647 vom 2025-09-10",
"url": "https://access.redhat.com/errata/RHSA-2025:15647"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15648 vom 2025-09-10",
"url": "https://access.redhat.com/errata/RHSA-2025:15648"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15661 vom 2025-09-11",
"url": "https://access.redhat.com/errata/RHSA-2025:15661"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03204-1 vom 2025-09-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022522.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-15661 vom 2025-09-13",
"url": "http://linux.oracle.com/errata/ELSA-2025-15661.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15782 vom 2025-09-15",
"url": "https://access.redhat.com/errata/RHSA-2025:15782"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-15782 vom 2025-09-19",
"url": "https://linux.oracle.com/errata/ELSA-2025-15782.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03283-1 vom 2025-09-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022596.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6008 vom 2025-09-23",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00172.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6009 vom 2025-09-23",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00173.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03310-1 vom 2025-09-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022610.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03314-1 vom 2025-09-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022615.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7770-1 vom 2025-09-24",
"url": "https://ubuntu.com/security/notices/USN-7770-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7769-1 vom 2025-09-24",
"url": "https://ubuntu.com/security/notices/USN-7769-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7771-1 vom 2025-09-24",
"url": "https://ubuntu.com/security/notices/USN-7771-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03344-1 vom 2025-09-24",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKXOSPRZJUZDU6VCQLCJK56ZS5CAS3IE/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7769-2 vom 2025-09-24",
"url": "https://ubuntu.com/security/notices/USN-7769-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7774-1 vom 2025-09-25",
"url": "https://ubuntu.com/security/notices/USN-7774-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7774-3 vom 2025-09-25",
"url": "https://ubuntu.com/security/notices/USN-7774-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7774-2 vom 2025-09-25",
"url": "https://ubuntu.com/security/notices/USN-7774-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7776-1 vom 2025-09-25",
"url": "https://ubuntu.com/security/notices/USN-7776-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7775-1 vom 2025-09-25",
"url": "https://ubuntu.com/security/notices/USN-7775-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-15648 vom 2025-09-25",
"url": "https://linux.oracle.com/errata/ELSA-2025-15648.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7775-2 vom 2025-09-26",
"url": "https://ubuntu.com/security/notices/USN-7775-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7769-3 vom 2025-09-26",
"url": "https://ubuntu.com/security/notices/USN-7769-3"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03383-1 vom 2025-09-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022724.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03384-1 vom 2025-09-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022723.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7775-3 vom 2025-10-01",
"url": "https://ubuntu.com/security/notices/USN-7775-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7789-1 vom 2025-10-01",
"url": "https://ubuntu.com/security/notices/USN-7789-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7774-4 vom 2025-10-01",
"url": "https://ubuntu.com/security/notices/USN-7774-4"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:17159 vom 2025-10-01",
"url": "https://access.redhat.com/errata/RHSA-2025:17159"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7774-5 vom 2025-10-06",
"url": "https://ubuntu.com/security/notices/USN-7774-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7789-2 vom 2025-10-08",
"url": "https://ubuntu.com/security/notices/USN-7789-2"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:15661 vom 2025-10-10",
"url": "https://errata.build.resf.org/RLSA-2025:15661"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4327 vom 2025-10-13",
"url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4328 vom 2025-10-13",
"url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20663 vom 2025-10-13",
"url": "https://linux.oracle.com/errata/ELSA-2025-20663.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20662 vom 2025-10-15",
"url": "https://linux.oracle.com/errata/ELSA-2025-20662.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-17161 vom 2025-10-21",
"url": "https://linux.oracle.com/errata/ELSA-2025-17161.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7833-1 vom 2025-10-22",
"url": "https://ubuntu.com/security/notices/USN-7833-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7834-1 vom 2025-10-22",
"url": "https://ubuntu.com/security/notices/USN-7834-1"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen erm\u00f6glichen Denial of Service",
"tracking": {
"current_release_date": "2025-10-21T22:00:00.000+00:00",
"generator": {
"date": "2025-10-22T07:53:59.701+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2025-1522",
"initial_release_date": "2025-07-09T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-07-09T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-07-10T22:00:00.000+00:00",
"number": "2",
"summary": "Referenz(en) aufgenommen: EUVD-2025-20969, EUVD-2025-20959, EUVD-2025-20898, EUVD-2025-20899, EUVD-2025-20900, EUVD-2025-20901"
},
{
"date": "2025-08-03T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-04T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-08-10T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-08-12T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-08-13T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Oracle Linux und Debian aufgenommen"
},
{
"date": "2025-08-17T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-08-18T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Red Hat und SUSE aufgenommen"
},
{
"date": "2025-08-19T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-24T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-27T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-28T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-31T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-09-01T22:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-09-03T22:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-09-08T22:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-09-09T22:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-09-10T22:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-09-14T22:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von SUSE und Oracle Linux aufgenommen"
},
{
"date": "2025-09-18T22:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-09-21T22:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-09-22T22:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-09-23T22:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-09-24T22:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-09-25T22:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-09-28T22:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-09-30T22:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-10-01T22:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von Ubuntu und Red Hat aufgenommen"
},
{
"date": "2025-10-06T22:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-10-07T22:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-10-09T22:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2025-10-12T22:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-10-13T22:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-10-14T22:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-10-20T22:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-10-21T22:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von Ubuntu aufgenommen"
}
],
"status": "final",
"version": "37"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "T032258",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-26145",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2020-26145"
},
{
"cve": "CVE-2025-38265",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38265"
},
{
"cve": "CVE-2025-38266",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38266"
},
{
"cve": "CVE-2025-38267",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38267"
},
{
"cve": "CVE-2025-38268",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38268"
},
{
"cve": "CVE-2025-38269",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38269"
},
{
"cve": "CVE-2025-38270",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38270"
},
{
"cve": "CVE-2025-38271",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38271"
},
{
"cve": "CVE-2025-38272",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38272"
},
{
"cve": "CVE-2025-38273",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38273"
},
{
"cve": "CVE-2025-38274",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38274"
},
{
"cve": "CVE-2025-38275",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38275"
},
{
"cve": "CVE-2025-38276",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38276"
},
{
"cve": "CVE-2025-38277",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38277"
},
{
"cve": "CVE-2025-38278",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38278"
},
{
"cve": "CVE-2025-38279",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38279"
},
{
"cve": "CVE-2025-38280",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38280"
},
{
"cve": "CVE-2025-38281",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38281"
},
{
"cve": "CVE-2025-38282",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38282"
},
{
"cve": "CVE-2025-38283",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38283"
},
{
"cve": "CVE-2025-38284",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38284"
},
{
"cve": "CVE-2025-38285",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38285"
},
{
"cve": "CVE-2025-38286",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38286"
},
{
"cve": "CVE-2025-38287",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38287"
},
{
"cve": "CVE-2025-38288",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38288"
},
{
"cve": "CVE-2025-38289",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38289"
},
{
"cve": "CVE-2025-38290",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38290"
},
{
"cve": "CVE-2025-38291",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38291"
},
{
"cve": "CVE-2025-38292",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38292"
},
{
"cve": "CVE-2025-38293",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38293"
},
{
"cve": "CVE-2025-38294",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38294"
},
{
"cve": "CVE-2025-38295",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38295"
},
{
"cve": "CVE-2025-38296",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38296"
},
{
"cve": "CVE-2025-38297",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38297"
},
{
"cve": "CVE-2025-38298",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38298"
},
{
"cve": "CVE-2025-38299",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38299"
},
{
"cve": "CVE-2025-38300",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38300"
},
{
"cve": "CVE-2025-38301",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38301"
},
{
"cve": "CVE-2025-38302",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38302"
},
{
"cve": "CVE-2025-38303",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38303"
},
{
"cve": "CVE-2025-38304",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38304"
},
{
"cve": "CVE-2025-38305",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38305"
},
{
"cve": "CVE-2025-38306",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38306"
},
{
"cve": "CVE-2025-38307",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38307"
},
{
"cve": "CVE-2025-38308",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38308"
},
{
"cve": "CVE-2025-38309",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38309"
},
{
"cve": "CVE-2025-38310",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38310"
},
{
"cve": "CVE-2025-38311",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38311"
},
{
"cve": "CVE-2025-38312",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38312"
},
{
"cve": "CVE-2025-38313",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38313"
},
{
"cve": "CVE-2025-38314",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38314"
},
{
"cve": "CVE-2025-38315",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38315"
},
{
"cve": "CVE-2025-38316",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38316"
},
{
"cve": "CVE-2025-38317",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38317"
},
{
"cve": "CVE-2025-38318",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38318"
},
{
"cve": "CVE-2025-38319",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38319"
},
{
"cve": "CVE-2025-38320",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38320"
},
{
"cve": "CVE-2025-38321",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38321"
},
{
"cve": "CVE-2025-38322",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38322"
},
{
"cve": "CVE-2025-38323",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38323"
},
{
"cve": "CVE-2025-38324",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38324"
},
{
"cve": "CVE-2025-38325",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38325"
},
{
"cve": "CVE-2025-38326",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38326"
},
{
"cve": "CVE-2025-38327",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38327"
},
{
"cve": "CVE-2025-38328",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38328"
},
{
"cve": "CVE-2025-38329",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38329"
},
{
"cve": "CVE-2025-38330",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38330"
},
{
"cve": "CVE-2025-38331",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38331"
},
{
"cve": "CVE-2025-38332",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38332"
},
{
"cve": "CVE-2025-38333",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38333"
},
{
"cve": "CVE-2025-38334",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38334"
},
{
"cve": "CVE-2025-38335",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38335"
},
{
"cve": "CVE-2025-38336",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38336"
},
{
"cve": "CVE-2025-38337",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38337"
},
{
"cve": "CVE-2025-38338",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38338"
},
{
"cve": "CVE-2025-38339",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38339"
},
{
"cve": "CVE-2025-38340",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38340"
},
{
"cve": "CVE-2025-38341",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38341"
},
{
"cve": "CVE-2025-38342",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38342"
},
{
"cve": "CVE-2025-38343",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38343"
},
{
"cve": "CVE-2025-38344",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38344"
},
{
"cve": "CVE-2025-38345",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38345"
},
{
"cve": "CVE-2025-38346",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38346"
},
{
"cve": "CVE-2025-38347",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38347"
},
{
"cve": "CVE-2025-38348",
"product_status": {
"known_affected": [
"T032258",
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2025-07-09T22:00:00.000+00:00",
"title": "CVE-2025-38348"
}
]
}
WID-SEC-W-2022-2069
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "IEEE 802.11 definiert die Wireless-LAN (WLAN) Standards.\r\nWPA2 ist der aktuelle Verschl\u00fcsselungsstandard f\u00fcr Wireless LAN.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in der IEEE 802.11 Spezifikation und zahlreichen Implementierungen ausnutzen, um Sicherheitsvorkehrungen zu umgehen, Netzwerkverkehr zu manipulieren und um Informationen offenzulegen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- UNIX\n- Linux\n- MacOS X\n- Windows\n- Android\n- iPhoneOS\n- CISCO Appliance\n- Juniper Appliance\n- Sonstiges\n- Hardware Appliance\n- Appliance",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2022-2069 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2021/wid-sec-w-2022-2069.json"
},
{
"category": "self",
"summary": "WID-SEC-2022-2069 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-2069"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:2809-1 vom 2023-07-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-July/015470.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-3380 vom 2023-04-01",
"url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html"
},
{
"category": "external",
"summary": "Wi-Fi Alliance security update vom 2021-05-11",
"url": "https://www.wi-fi.org/security-update-fragmentation"
},
{
"category": "external",
"summary": "FragAttacks Test Tool",
"url": "https://github.com/vanhoefm/fragattacks"
},
{
"category": "external",
"summary": "Aruba Product Security Advisory PSA-2021-011",
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-011.txt"
},
{
"category": "external",
"summary": "FragAttack Website",
"url": "https://www.fragattacks.com/"
},
{
"category": "external",
"summary": "Arista Security Advisory",
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63"
},
{
"category": "external",
"summary": "Microsoft Leitfaden f\u00fcr Sicherheitsupdates",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-24587"
},
{
"category": "external",
"summary": "Microsoft Leitfaden f\u00fcr Sicherheitsupdates",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-24588"
},
{
"category": "external",
"summary": "Microsoft Leitfaden f\u00fcr Sicherheitsupdates",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-26144"
},
{
"category": "external",
"summary": "Cisco Security Advisory cisco-sa-wifi-faf-22epcEWu",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00473",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html"
},
{
"category": "external",
"summary": "AVM Sicherheitshinweise vom 2021-05-11",
"url": "https://avm.de/service/aktuelle-sicherheitshinweise/"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA11170 vom 20201-05-11",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11170"
},
{
"category": "external",
"summary": "Linux Kernel Patches vom 2021-05-11",
"url": "https://lore.kernel.org/linux-wireless/20210511180259.159598-1-johannes@sipsolutions.net/"
},
{
"category": "external",
"summary": "Lenovo Security Advisory LEN-57316 vom 2021-05-11",
"url": "https://support.lenovo.com/de/de/product_security/ps500405-intel-proset-and-wireless-wifi-intel-vpro-csme-wifi-and-intel-killer-wifi-advisory"
},
{
"category": "external",
"summary": "BSI-Cyber-Sicherheitswarnung vom 2021-05-11",
"url": "https://www.bsi.bund.de/SharedDocs/Cybersicherheitswarnungen/DE/2021/2021-216748-1032.pdf?__blob=publicationFile\u0026v=3"
},
{
"category": "external",
"summary": "Deutsche Telekom Pressemeldung zu FragAttack vom 2021-05-12",
"url": "https://www.telekom.com/de/konzern/details/fragattack-luecke-im-wlan-standard-626972"
},
{
"category": "external",
"summary": "SYNOLOGY Security Advisory SYNOLOGY-SA-21:20 vom 2021-05-12",
"url": "https://www.synology.com/en-global/support/security/Synology_SA_21_20"
},
{
"category": "external",
"summary": "Zyxel security advisory for FragAttacks against WiFi products vom 2021-05-13",
"url": "https://www.zyxel.com/support/Zyxel_security_advisory_for_FragAttacks_against_WiFi_products.shtml"
},
{
"category": "external",
"summary": "EMC Security Advisory DSA-2021-100 vom 2021-05-17",
"url": "https://www.dell.com/support/kbdoc/de-de/000186331/dsa-2021-100-dell-client-platform-security-update-for-intel-wifi-software-vulnerabilitiesdsa-2021-100-dell-client-platform-security-update-for-intel-wifi-software-vulnerabilities"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:1912-1 vom 2021-06-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/008974.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:1913-1 vom 2021-06-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/008973.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:1899-1 vom 2021-06-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/008965.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:1888-1 vom 2021-06-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/008950.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:1889-1 vom 2021-06-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/008956.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:1887-1 vom 2021-06-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/008955.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:1890-1 vom 2021-06-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/008947.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:1891-1 vom 2021-06-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/008946.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:1977-1 vom 2021-06-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:1975-1 vom 2021-06-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-2690 vom 2021-06-23",
"url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-2689 vom 2021-06-23",
"url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4997-1 vom 2021-06-23",
"url": "https://ubuntu.com/security/notices/USN-4997-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4999-1 vom 2021-06-23",
"url": "https://ubuntu.com/security/notices/USN-4999-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5001-1 vom 2021-06-23",
"url": "https://ubuntu.com/security/notices/USN-5001-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5000-1 vom 2021-06-23",
"url": "https://ubuntu.com/security/notices/USN-5000-1"
},
{
"category": "external",
"summary": "HPE Security Bulletin",
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-hpesbnw04145en_us"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5000-2 vom 2021-06-25",
"url": "https://ubuntu.com/security/notices/USN-5000-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4997-2 vom 2021-06-25",
"url": "https://ubuntu.com/security/notices/USN-4997-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:2208-1 vom 2021-06-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/009103.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:14764-1 vom 2021-07-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009128.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:2324-1 vom 2021-07-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009141.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:2349-1 vom 2021-07-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009133.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:2321-1 vom 2021-07-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009132.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5018-1 vom 2021-07-21",
"url": "https://ubuntu.com/security/notices/USN-5018-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:2406-1 vom 2021-07-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:2427-1 vom 2021-07-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009190.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:2421-1 vom 2021-07-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:2422-1 vom 2021-07-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009191.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:2451-1 vom 2021-07-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2021-9406 vom 2021-08-10",
"url": "http://linux.oracle.com/errata/ELSA-2021-9406.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2021-9404 vom 2021-08-10",
"url": "http://linux.oracle.com/errata/ELSA-2021-9404.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2021-9452 vom 2021-09-21",
"url": "https://linux.oracle.com/errata/ELSA-2021-9452.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2021-9453 vom 2021-09-21",
"url": "https://linux.oracle.com/errata/ELSA-2021-9453.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2021-9459 vom 2021-09-22",
"url": "http://linux.oracle.com/errata/ELSA-2021-9459.html"
},
{
"category": "external",
"summary": "ORACLE OVMSA-2021-0031 vom 2021-09-22",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2021-September/001030.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2021-9473 vom 2021-10-08",
"url": "http://linux.oracle.com/errata/ELSA-2021-9473.html"
},
{
"category": "external",
"summary": "ORACLE OVMSA-2021-0035 vom 2021-10-12",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2021-October/001033.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:4140 vom 2021-11-10",
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:4356 vom 2021-11-09",
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2022-004 vom 2022-01-31",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2022-004.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2022-002 vom 2022-01-31",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2022-002.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5299-1 vom 2022-02-22",
"url": "https://ubuntu.com/security/notices/USN-5299-1"
},
{
"category": "external",
"summary": "FreeBSD Security Advisory FREEBSD-SA-22:02.WIFI vom 2022-03-15",
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-22:02.wifi.asc"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5343-1 vom 2022-03-22",
"url": "https://ubuntu.com/security/notices/USN-5343-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2022-9999 vom 2022-11-16",
"url": "http://linux.oracle.com/errata/ELSA-2022-9999.html"
},
{
"category": "external",
"summary": "HP Security Bulletin HPSBPI03763 vom 2022-12-15",
"url": "https://support.hp.com/de-de/document/ish_5610341-5610907-16/HPSBPI03763"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:0394-1 vom 2023-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-February/013743.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:0433-1 vom 2023-02-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-February/013801.html"
}
],
"source_lang": "en-US",
"title": "IEEE 802.11 (WLAN): Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2023-07-11T22:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:38:13.561+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2022-2069",
"initial_release_date": "2021-05-11T22:00:00.000+00:00",
"revision_history": [
{
"date": "2021-05-11T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2021-05-13T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Informationen von Zyxel aufgenommen"
},
{
"date": "2021-05-16T22:00:00.000+00:00",
"number": "3",
"summary": "Produktzuordnung bzgl. Arista korrigiert"
},
{
"date": "2021-06-08T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2021-06-09T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2021-06-15T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2021-06-22T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Debian und Ubuntu aufgenommen"
},
{
"date": "2021-06-27T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von HP und Ubuntu aufgenommen"
},
{
"date": "2021-06-30T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2021-07-13T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2021-07-14T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2021-07-20T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2021-07-21T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2021-07-22T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2021-08-09T22:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2021-09-20T22:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2021-09-22T22:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Oracle Linux und ORACLE aufgenommen"
},
{
"date": "2021-10-10T22:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2021-10-11T22:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von ORACLE aufgenommen"
},
{
"date": "2021-11-09T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2022-01-30T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2022-02-21T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-03-15T23:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von FreeBSD aufgenommen"
},
{
"date": "2022-03-22T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-11-16T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2022-12-14T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von HP aufgenommen"
},
{
"date": "2023-02-13T23:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-02-15T23:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-04-02T22:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2023-07-11T22:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von SUSE aufgenommen"
}
],
"status": "final",
"version": "30"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "AVM FRITZ!Box",
"product": {
"name": "AVM FRITZ!Box",
"product_id": "T002543",
"product_identification_helper": {
"cpe": "cpe:/o:avm:fritzos:-"
}
}
}
],
"category": "vendor",
"name": "AVM"
},
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Apple iOS",
"product": {
"name": "Apple iOS",
"product_id": "T005205",
"product_identification_helper": {
"cpe": "cpe:/o:apple:iphone_os:-"
}
}
},
{
"category": "product_name",
"name": "Apple iPadOS",
"product": {
"name": "Apple iPadOS",
"product_id": "T016605",
"product_identification_helper": {
"cpe": "cpe:/o:apple:ipados:-"
}
}
},
{
"category": "product_name",
"name": "Apple macOS",
"product": {
"name": "Apple macOS",
"product_id": "697",
"product_identification_helper": {
"cpe": "cpe:/o:apple:mac_os:-"
}
}
}
],
"category": "vendor",
"name": "Apple"
},
{
"branches": [
{
"category": "product_name",
"name": "Arista WiFi Access Point",
"product": {
"name": "Arista WiFi Access Point",
"product_id": "T019358",
"product_identification_helper": {
"cpe": "cpe:/h:arista:wifi_access_point:-"
}
}
}
],
"category": "vendor",
"name": "Arista"
},
{
"branches": [
{
"category": "product_name",
"name": "Aruba ArubaOS",
"product": {
"name": "Aruba ArubaOS",
"product_id": "T016785",
"product_identification_helper": {
"cpe": "cpe:/o:arubanetworks:arubaos:-"
}
}
}
],
"category": "vendor",
"name": "Aruba"
},
{
"branches": [
{
"category": "product_name",
"name": "Cisco Aironet Access Point",
"product": {
"name": "Cisco Aironet Access Point",
"product_id": "T012215",
"product_identification_helper": {
"cpe": "cpe:/o:cisco:aironet_access_point_software:-"
}
}
},
{
"category": "product_name",
"name": "Cisco Catalyst",
"product": {
"name": "Cisco Catalyst",
"product_id": "T000491",
"product_identification_helper": {
"cpe": "cpe:/h:cisco:catalyst:-"
}
}
},
{
"category": "product_name",
"name": "Cisco IP Phone",
"product": {
"name": "Cisco IP Phone",
"product_id": "2070",
"product_identification_helper": {
"cpe": "cpe:/h:cisco:ip_phone:-"
}
}
},
{
"branches": [
{
"category": "product_name",
"name": "Cisco WebEx Wireless Phone",
"product": {
"name": "Cisco WebEx Wireless Phone",
"product_id": "T018746",
"product_identification_helper": {
"cpe": "cpe:/a:cisco:webex:wireless_phone"
}
}
},
{
"category": "product_name",
"name": "Cisco WebEx Desk Series",
"product": {
"name": "Cisco WebEx Desk Series",
"product_id": "T019302",
"product_identification_helper": {
"cpe": "cpe:/a:cisco:webex:desk_series"
}
}
},
{
"category": "product_name",
"name": "Cisco WebEx Room Series",
"product": {
"name": "Cisco WebEx Room Series",
"product_id": "T019303",
"product_identification_helper": {
"cpe": "cpe:/a:cisco:webex:room_series"
}
}
},
{
"category": "product_name",
"name": "Cisco WebEx Board Series",
"product": {
"name": "Cisco WebEx Board Series",
"product_id": "T019304",
"product_identification_helper": {
"cpe": "cpe:/a:cisco:webex:board_series"
}
}
}
],
"category": "product_name",
"name": "WebEx"
},
{
"category": "product_name",
"name": "Cisco Wireless IP Phone",
"product": {
"name": "Cisco Wireless IP Phone",
"product_id": "T015978",
"product_identification_helper": {
"cpe": "cpe:/h:cisco:wireless_ip_phone:8821"
}
}
}
],
"category": "vendor",
"name": "Cisco"
},
{
"branches": [
{
"category": "product_name",
"name": "D-LINK Router",
"product": {
"name": "D-LINK Router",
"product_id": "T009493",
"product_identification_helper": {
"cpe": "cpe:/h:d-link:router:-"
}
}
}
],
"category": "vendor",
"name": "D-LINK"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Dell Computer",
"product": {
"name": "Dell Computer",
"product_id": "T006498",
"product_identification_helper": {
"cpe": "cpe:/o:dell:dell_computer:-"
}
}
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "FreeBSD Project FreeBSD OS",
"product": {
"name": "FreeBSD Project FreeBSD OS",
"product_id": "4035",
"product_identification_helper": {
"cpe": "cpe:/o:freebsd:freebsd:-"
}
}
}
],
"category": "vendor",
"name": "FreeBSD Project"
},
{
"branches": [
{
"category": "product_name",
"name": "Google Android",
"product": {
"name": "Google Android",
"product_id": "132177",
"product_identification_helper": {
"cpe": "cpe:/o:google:android:-"
}
}
}
],
"category": "vendor",
"name": "Google"
},
{
"branches": [
{
"category": "product_name",
"name": "HP LaserJet",
"product": {
"name": "HP LaserJet",
"product_id": "T000052",
"product_identification_helper": {
"cpe": "cpe:/h:hp:laserjet:p3015"
}
}
}
],
"category": "vendor",
"name": "HP"
},
{
"branches": [
{
"category": "product_name",
"name": "Intel PROSet Wireless WiFi Software",
"product": {
"name": "Intel PROSet Wireless WiFi Software",
"product_id": "T015357",
"product_identification_helper": {
"cpe": "cpe:/a:intel:proset_wireless:-"
}
}
}
],
"category": "vendor",
"name": "Intel"
},
{
"branches": [
{
"category": "product_name",
"name": "Juniper SRX Series",
"product": {
"name": "Juniper SRX Series",
"product_id": "T008011",
"product_identification_helper": {
"cpe": "cpe:/h:juniper:srx_service_gateways:-"
}
}
}
],
"category": "vendor",
"name": "Juniper"
},
{
"branches": [
{
"category": "product_name",
"name": "LANCOM Router",
"product": {
"name": "LANCOM Router",
"product_id": "T019305",
"product_identification_helper": {
"cpe": "cpe:/h:lancom:router:-"
}
}
}
],
"category": "vendor",
"name": "LANCOM"
},
{
"branches": [
{
"category": "product_name",
"name": "Lenovo Computer",
"product": {
"name": "Lenovo Computer",
"product_id": "T006520",
"product_identification_helper": {
"cpe": "cpe:/o:lenovo:lenovo_computer:-"
}
}
}
],
"category": "vendor",
"name": "Lenovo"
},
{
"branches": [
{
"category": "product_name",
"name": "Microsoft Windows",
"product": {
"name": "Microsoft Windows",
"product_id": "7107",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows:-"
}
}
}
],
"category": "vendor",
"name": "Microsoft"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "6368",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Specification WPA2",
"product": {
"name": "Specification WPA2",
"product_id": "T010954",
"product_identification_helper": {
"cpe": "cpe:/h:ieee:wpa2:-"
}
}
}
],
"category": "vendor",
"name": "Specification"
},
{
"branches": [
{
"category": "product_name",
"name": "Synology NAS",
"product": {
"name": "Synology NAS",
"product_id": "T016423",
"product_identification_helper": {
"cpe": "cpe:/h:synology:nas:-"
}
}
}
],
"category": "vendor",
"name": "Synology"
},
{
"branches": [
{
"category": "product_name",
"name": "Telekom Speedport",
"product": {
"name": "Telekom Speedport",
"product_id": "T019316",
"product_identification_helper": {
"cpe": "cpe:/h:telekom:speedport:-"
}
}
}
],
"category": "vendor",
"name": "Telekom"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
},
{
"branches": [
{
"category": "product_name",
"name": "Zyxel Firewall",
"product": {
"name": "Zyxel Firewall",
"product_id": "T019338",
"product_identification_helper": {
"cpe": "cpe:/h:zyxel:firewall:-"
}
}
}
],
"category": "vendor",
"name": "Zyxel"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-11264",
"notes": [
{
"category": "description",
"text": "Die IEEE 802.11 (WiFi)-Spezifikation und zahlreiche Implementierungen dieser Spezifikation weisen mehrere Schwachstellen auf. Der 802.11-Frame-Aggregation-Funktionalit\u00e4t fehlen mehrere Pr\u00fcfungen und Validierungen (die von der Spezifikation nicht gefordert werden), wodurch bestimmte Teile eines Frames ungesch\u00fctzt bleiben. Bei der Fragmentierungsfunktion f\u00fcr 802.11-Frames fehlen \u00dcberpr\u00fcfungen, was mitunter zur Entgegennahme von unverschl\u00fcsselten Frames oder Fragmenten f\u00fchrt. Au\u00dferdem gibt es bei EAPoL (Extensible Authentication Protocol over Local Area Network) und TKIP (Temporal Key Integrity Protocol) mehrere produktspezifische Implementierungsfehler. Ein Angreifer innerhalb der WiFi-Funkreichweite kann diese Schwachstellen ausnutzen, um beliebigen Datenverkehr in ein drahtloses Netzwerk zu injizieren und Daten zu exfiltrieren. Zu den praktischen Angriffen geh\u00f6ren verschiedene Arten von Man-in-the-Middle-Angriffen (um die Ausnutzung anderer Schwachstellen zu erm\u00f6glichen), DNS Poisoning (z. B. um Phishing zu erm\u00f6glichen) und die Offenlegung von Daten aus ungesch\u00fctzter Kommunikation."
}
],
"product_status": {
"known_affected": [
"2070",
"T006498",
"T010954",
"132177",
"67646",
"4035",
"T005205",
"T012215",
"T004914",
"T019358",
"697",
"T019316",
"T019338",
"T018746",
"398363",
"T000052",
"T008011",
"T000491",
"T006520",
"T015978",
"T016605",
"6368",
"T015357",
"T016423",
"T016785",
"T019302",
"T019304",
"T019303",
"2951",
"T002207",
"T019305",
"T000126",
"7107",
"T002543",
"T009493"
]
},
"release_date": "2021-05-11T22:00:00.000+00:00",
"title": "CVE-2020-11264"
},
{
"cve": "CVE-2020-11301",
"notes": [
{
"category": "description",
"text": "Die IEEE 802.11 (WiFi)-Spezifikation und zahlreiche Implementierungen dieser Spezifikation weisen mehrere Schwachstellen auf. Der 802.11-Frame-Aggregation-Funktionalit\u00e4t fehlen mehrere Pr\u00fcfungen und Validierungen (die von der Spezifikation nicht gefordert werden), wodurch bestimmte Teile eines Frames ungesch\u00fctzt bleiben. Bei der Fragmentierungsfunktion f\u00fcr 802.11-Frames fehlen \u00dcberpr\u00fcfungen, was mitunter zur Entgegennahme von unverschl\u00fcsselten Frames oder Fragmenten f\u00fchrt. Au\u00dferdem gibt es bei EAPoL (Extensible Authentication Protocol over Local Area Network) und TKIP (Temporal Key Integrity Protocol) mehrere produktspezifische Implementierungsfehler. Ein Angreifer innerhalb der WiFi-Funkreichweite kann diese Schwachstellen ausnutzen, um beliebigen Datenverkehr in ein drahtloses Netzwerk zu injizieren und Daten zu exfiltrieren. Zu den praktischen Angriffen geh\u00f6ren verschiedene Arten von Man-in-the-Middle-Angriffen (um die Ausnutzung anderer Schwachstellen zu erm\u00f6glichen), DNS Poisoning (z. B. um Phishing zu erm\u00f6glichen) und die Offenlegung von Daten aus ungesch\u00fctzter Kommunikation."
}
],
"product_status": {
"known_affected": [
"2070",
"T006498",
"T010954",
"132177",
"67646",
"4035",
"T005205",
"T012215",
"T004914",
"T019358",
"697",
"T019316",
"T019338",
"T018746",
"398363",
"T000052",
"T008011",
"T000491",
"T006520",
"T015978",
"T016605",
"6368",
"T015357",
"T016423",
"T016785",
"T019302",
"T019304",
"T019303",
"2951",
"T002207",
"T019305",
"T000126",
"7107",
"T002543",
"T009493"
]
},
"release_date": "2021-05-11T22:00:00.000+00:00",
"title": "CVE-2020-11301"
},
{
"cve": "CVE-2020-24586",
"notes": [
{
"category": "description",
"text": "Die IEEE 802.11 (WiFi)-Spezifikation und zahlreiche Implementierungen dieser Spezifikation weisen mehrere Schwachstellen auf. Der 802.11-Frame-Aggregation-Funktionalit\u00e4t fehlen mehrere Pr\u00fcfungen und Validierungen (die von der Spezifikation nicht gefordert werden), wodurch bestimmte Teile eines Frames ungesch\u00fctzt bleiben. Bei der Fragmentierungsfunktion f\u00fcr 802.11-Frames fehlen \u00dcberpr\u00fcfungen, was mitunter zur Entgegennahme von unverschl\u00fcsselten Frames oder Fragmenten f\u00fchrt. Au\u00dferdem gibt es bei EAPoL (Extensible Authentication Protocol over Local Area Network) und TKIP (Temporal Key Integrity Protocol) mehrere produktspezifische Implementierungsfehler. Ein Angreifer innerhalb der WiFi-Funkreichweite kann diese Schwachstellen ausnutzen, um beliebigen Datenverkehr in ein drahtloses Netzwerk zu injizieren und Daten zu exfiltrieren. Zu den praktischen Angriffen geh\u00f6ren verschiedene Arten von Man-in-the-Middle-Angriffen (um die Ausnutzung anderer Schwachstellen zu erm\u00f6glichen), DNS Poisoning (z. B. um Phishing zu erm\u00f6glichen) und die Offenlegung von Daten aus ungesch\u00fctzter Kommunikation."
}
],
"product_status": {
"known_affected": [
"2070",
"T006498",
"T010954",
"132177",
"67646",
"4035",
"T005205",
"T012215",
"T004914",
"T019358",
"697",
"T019316",
"T019338",
"T018746",
"398363",
"T000052",
"T008011",
"T000491",
"T006520",
"T015978",
"T016605",
"6368",
"T015357",
"T016423",
"T016785",
"T019302",
"T019304",
"T019303",
"2951",
"T002207",
"T019305",
"T000126",
"7107",
"T002543",
"T009493"
]
},
"release_date": "2021-05-11T22:00:00.000+00:00",
"title": "CVE-2020-24586"
},
{
"cve": "CVE-2020-24587",
"notes": [
{
"category": "description",
"text": "Die IEEE 802.11 (WiFi)-Spezifikation und zahlreiche Implementierungen dieser Spezifikation weisen mehrere Schwachstellen auf. Der 802.11-Frame-Aggregation-Funktionalit\u00e4t fehlen mehrere Pr\u00fcfungen und Validierungen (die von der Spezifikation nicht gefordert werden), wodurch bestimmte Teile eines Frames ungesch\u00fctzt bleiben. Bei der Fragmentierungsfunktion f\u00fcr 802.11-Frames fehlen \u00dcberpr\u00fcfungen, was mitunter zur Entgegennahme von unverschl\u00fcsselten Frames oder Fragmenten f\u00fchrt. Au\u00dferdem gibt es bei EAPoL (Extensible Authentication Protocol over Local Area Network) und TKIP (Temporal Key Integrity Protocol) mehrere produktspezifische Implementierungsfehler. Ein Angreifer innerhalb der WiFi-Funkreichweite kann diese Schwachstellen ausnutzen, um beliebigen Datenverkehr in ein drahtloses Netzwerk zu injizieren und Daten zu exfiltrieren. Zu den praktischen Angriffen geh\u00f6ren verschiedene Arten von Man-in-the-Middle-Angriffen (um die Ausnutzung anderer Schwachstellen zu erm\u00f6glichen), DNS Poisoning (z. B. um Phishing zu erm\u00f6glichen) und die Offenlegung von Daten aus ungesch\u00fctzter Kommunikation."
}
],
"product_status": {
"known_affected": [
"2070",
"T006498",
"T010954",
"132177",
"67646",
"4035",
"T005205",
"T012215",
"T004914",
"T019358",
"697",
"T019316",
"T019338",
"T018746",
"398363",
"T000052",
"T008011",
"T000491",
"T006520",
"T015978",
"T016605",
"6368",
"T015357",
"T016423",
"T016785",
"T019302",
"T019304",
"T019303",
"2951",
"T002207",
"T019305",
"T000126",
"7107",
"T002543",
"T009493"
]
},
"release_date": "2021-05-11T22:00:00.000+00:00",
"title": "CVE-2020-24587"
},
{
"cve": "CVE-2020-24588",
"notes": [
{
"category": "description",
"text": "Die IEEE 802.11 (WiFi)-Spezifikation und zahlreiche Implementierungen dieser Spezifikation weisen mehrere Schwachstellen auf. Der 802.11-Frame-Aggregation-Funktionalit\u00e4t fehlen mehrere Pr\u00fcfungen und Validierungen (die von der Spezifikation nicht gefordert werden), wodurch bestimmte Teile eines Frames ungesch\u00fctzt bleiben. Bei der Fragmentierungsfunktion f\u00fcr 802.11-Frames fehlen \u00dcberpr\u00fcfungen, was mitunter zur Entgegennahme von unverschl\u00fcsselten Frames oder Fragmenten f\u00fchrt. Au\u00dferdem gibt es bei EAPoL (Extensible Authentication Protocol over Local Area Network) und TKIP (Temporal Key Integrity Protocol) mehrere produktspezifische Implementierungsfehler. Ein Angreifer innerhalb der WiFi-Funkreichweite kann diese Schwachstellen ausnutzen, um beliebigen Datenverkehr in ein drahtloses Netzwerk zu injizieren und Daten zu exfiltrieren. Zu den praktischen Angriffen geh\u00f6ren verschiedene Arten von Man-in-the-Middle-Angriffen (um die Ausnutzung anderer Schwachstellen zu erm\u00f6glichen), DNS Poisoning (z. B. um Phishing zu erm\u00f6glichen) und die Offenlegung von Daten aus ungesch\u00fctzter Kommunikation."
}
],
"product_status": {
"known_affected": [
"2070",
"T006498",
"T010954",
"132177",
"67646",
"4035",
"T005205",
"T012215",
"T004914",
"T019358",
"697",
"T019316",
"T019338",
"T018746",
"398363",
"T000052",
"T008011",
"T000491",
"T006520",
"T015978",
"T016605",
"6368",
"T015357",
"T016423",
"T016785",
"T019302",
"T019304",
"T019303",
"2951",
"T002207",
"T019305",
"T000126",
"7107",
"T002543",
"T009493"
]
},
"release_date": "2021-05-11T22:00:00.000+00:00",
"title": "CVE-2020-24588"
},
{
"cve": "CVE-2020-26139",
"notes": [
{
"category": "description",
"text": "Die IEEE 802.11 (WiFi)-Spezifikation und zahlreiche Implementierungen dieser Spezifikation weisen mehrere Schwachstellen auf. Der 802.11-Frame-Aggregation-Funktionalit\u00e4t fehlen mehrere Pr\u00fcfungen und Validierungen (die von der Spezifikation nicht gefordert werden), wodurch bestimmte Teile eines Frames ungesch\u00fctzt bleiben. Bei der Fragmentierungsfunktion f\u00fcr 802.11-Frames fehlen \u00dcberpr\u00fcfungen, was mitunter zur Entgegennahme von unverschl\u00fcsselten Frames oder Fragmenten f\u00fchrt. Au\u00dferdem gibt es bei EAPoL (Extensible Authentication Protocol over Local Area Network) und TKIP (Temporal Key Integrity Protocol) mehrere produktspezifische Implementierungsfehler. Ein Angreifer innerhalb der WiFi-Funkreichweite kann diese Schwachstellen ausnutzen, um beliebigen Datenverkehr in ein drahtloses Netzwerk zu injizieren und Daten zu exfiltrieren. Zu den praktischen Angriffen geh\u00f6ren verschiedene Arten von Man-in-the-Middle-Angriffen (um die Ausnutzung anderer Schwachstellen zu erm\u00f6glichen), DNS Poisoning (z. B. um Phishing zu erm\u00f6glichen) und die Offenlegung von Daten aus ungesch\u00fctzter Kommunikation."
}
],
"product_status": {
"known_affected": [
"2070",
"T006498",
"T010954",
"132177",
"67646",
"4035",
"T005205",
"T012215",
"T004914",
"T019358",
"697",
"T019316",
"T019338",
"T018746",
"398363",
"T000052",
"T008011",
"T000491",
"T006520",
"T015978",
"T016605",
"6368",
"T015357",
"T016423",
"T016785",
"T019302",
"T019304",
"T019303",
"2951",
"T002207",
"T019305",
"T000126",
"7107",
"T002543",
"T009493"
]
},
"release_date": "2021-05-11T22:00:00.000+00:00",
"title": "CVE-2020-26139"
},
{
"cve": "CVE-2020-26140",
"notes": [
{
"category": "description",
"text": "Die IEEE 802.11 (WiFi)-Spezifikation und zahlreiche Implementierungen dieser Spezifikation weisen mehrere Schwachstellen auf. Der 802.11-Frame-Aggregation-Funktionalit\u00e4t fehlen mehrere Pr\u00fcfungen und Validierungen (die von der Spezifikation nicht gefordert werden), wodurch bestimmte Teile eines Frames ungesch\u00fctzt bleiben. Bei der Fragmentierungsfunktion f\u00fcr 802.11-Frames fehlen \u00dcberpr\u00fcfungen, was mitunter zur Entgegennahme von unverschl\u00fcsselten Frames oder Fragmenten f\u00fchrt. Au\u00dferdem gibt es bei EAPoL (Extensible Authentication Protocol over Local Area Network) und TKIP (Temporal Key Integrity Protocol) mehrere produktspezifische Implementierungsfehler. Ein Angreifer innerhalb der WiFi-Funkreichweite kann diese Schwachstellen ausnutzen, um beliebigen Datenverkehr in ein drahtloses Netzwerk zu injizieren und Daten zu exfiltrieren. Zu den praktischen Angriffen geh\u00f6ren verschiedene Arten von Man-in-the-Middle-Angriffen (um die Ausnutzung anderer Schwachstellen zu erm\u00f6glichen), DNS Poisoning (z. B. um Phishing zu erm\u00f6glichen) und die Offenlegung von Daten aus ungesch\u00fctzter Kommunikation."
}
],
"product_status": {
"known_affected": [
"2070",
"T006498",
"T010954",
"132177",
"67646",
"4035",
"T005205",
"T012215",
"T004914",
"T019358",
"697",
"T019316",
"T019338",
"T018746",
"398363",
"T000052",
"T008011",
"T000491",
"T006520",
"T015978",
"T016605",
"6368",
"T015357",
"T016423",
"T016785",
"T019302",
"T019304",
"T019303",
"2951",
"T002207",
"T019305",
"T000126",
"7107",
"T002543",
"T009493"
]
},
"release_date": "2021-05-11T22:00:00.000+00:00",
"title": "CVE-2020-26140"
},
{
"cve": "CVE-2020-26141",
"notes": [
{
"category": "description",
"text": "Die IEEE 802.11 (WiFi)-Spezifikation und zahlreiche Implementierungen dieser Spezifikation weisen mehrere Schwachstellen auf. Der 802.11-Frame-Aggregation-Funktionalit\u00e4t fehlen mehrere Pr\u00fcfungen und Validierungen (die von der Spezifikation nicht gefordert werden), wodurch bestimmte Teile eines Frames ungesch\u00fctzt bleiben. Bei der Fragmentierungsfunktion f\u00fcr 802.11-Frames fehlen \u00dcberpr\u00fcfungen, was mitunter zur Entgegennahme von unverschl\u00fcsselten Frames oder Fragmenten f\u00fchrt. Au\u00dferdem gibt es bei EAPoL (Extensible Authentication Protocol over Local Area Network) und TKIP (Temporal Key Integrity Protocol) mehrere produktspezifische Implementierungsfehler. Ein Angreifer innerhalb der WiFi-Funkreichweite kann diese Schwachstellen ausnutzen, um beliebigen Datenverkehr in ein drahtloses Netzwerk zu injizieren und Daten zu exfiltrieren. Zu den praktischen Angriffen geh\u00f6ren verschiedene Arten von Man-in-the-Middle-Angriffen (um die Ausnutzung anderer Schwachstellen zu erm\u00f6glichen), DNS Poisoning (z. B. um Phishing zu erm\u00f6glichen) und die Offenlegung von Daten aus ungesch\u00fctzter Kommunikation."
}
],
"product_status": {
"known_affected": [
"2070",
"T006498",
"T010954",
"132177",
"67646",
"4035",
"T005205",
"T012215",
"T004914",
"T019358",
"697",
"T019316",
"T019338",
"T018746",
"398363",
"T000052",
"T008011",
"T000491",
"T006520",
"T015978",
"T016605",
"6368",
"T015357",
"T016423",
"T016785",
"T019302",
"T019304",
"T019303",
"2951",
"T002207",
"T019305",
"T000126",
"7107",
"T002543",
"T009493"
]
},
"release_date": "2021-05-11T22:00:00.000+00:00",
"title": "CVE-2020-26141"
},
{
"cve": "CVE-2020-26142",
"notes": [
{
"category": "description",
"text": "Die IEEE 802.11 (WiFi)-Spezifikation und zahlreiche Implementierungen dieser Spezifikation weisen mehrere Schwachstellen auf. Der 802.11-Frame-Aggregation-Funktionalit\u00e4t fehlen mehrere Pr\u00fcfungen und Validierungen (die von der Spezifikation nicht gefordert werden), wodurch bestimmte Teile eines Frames ungesch\u00fctzt bleiben. Bei der Fragmentierungsfunktion f\u00fcr 802.11-Frames fehlen \u00dcberpr\u00fcfungen, was mitunter zur Entgegennahme von unverschl\u00fcsselten Frames oder Fragmenten f\u00fchrt. Au\u00dferdem gibt es bei EAPoL (Extensible Authentication Protocol over Local Area Network) und TKIP (Temporal Key Integrity Protocol) mehrere produktspezifische Implementierungsfehler. Ein Angreifer innerhalb der WiFi-Funkreichweite kann diese Schwachstellen ausnutzen, um beliebigen Datenverkehr in ein drahtloses Netzwerk zu injizieren und Daten zu exfiltrieren. Zu den praktischen Angriffen geh\u00f6ren verschiedene Arten von Man-in-the-Middle-Angriffen (um die Ausnutzung anderer Schwachstellen zu erm\u00f6glichen), DNS Poisoning (z. B. um Phishing zu erm\u00f6glichen) und die Offenlegung von Daten aus ungesch\u00fctzter Kommunikation."
}
],
"product_status": {
"known_affected": [
"2070",
"T006498",
"T010954",
"132177",
"67646",
"4035",
"T005205",
"T012215",
"T004914",
"T019358",
"697",
"T019316",
"T019338",
"T018746",
"398363",
"T000052",
"T008011",
"T000491",
"T006520",
"T015978",
"T016605",
"6368",
"T015357",
"T016423",
"T016785",
"T019302",
"T019304",
"T019303",
"2951",
"T002207",
"T019305",
"T000126",
"7107",
"T002543",
"T009493"
]
},
"release_date": "2021-05-11T22:00:00.000+00:00",
"title": "CVE-2020-26142"
},
{
"cve": "CVE-2020-26143",
"notes": [
{
"category": "description",
"text": "Die IEEE 802.11 (WiFi)-Spezifikation und zahlreiche Implementierungen dieser Spezifikation weisen mehrere Schwachstellen auf. Der 802.11-Frame-Aggregation-Funktionalit\u00e4t fehlen mehrere Pr\u00fcfungen und Validierungen (die von der Spezifikation nicht gefordert werden), wodurch bestimmte Teile eines Frames ungesch\u00fctzt bleiben. Bei der Fragmentierungsfunktion f\u00fcr 802.11-Frames fehlen \u00dcberpr\u00fcfungen, was mitunter zur Entgegennahme von unverschl\u00fcsselten Frames oder Fragmenten f\u00fchrt. Au\u00dferdem gibt es bei EAPoL (Extensible Authentication Protocol over Local Area Network) und TKIP (Temporal Key Integrity Protocol) mehrere produktspezifische Implementierungsfehler. Ein Angreifer innerhalb der WiFi-Funkreichweite kann diese Schwachstellen ausnutzen, um beliebigen Datenverkehr in ein drahtloses Netzwerk zu injizieren und Daten zu exfiltrieren. Zu den praktischen Angriffen geh\u00f6ren verschiedene Arten von Man-in-the-Middle-Angriffen (um die Ausnutzung anderer Schwachstellen zu erm\u00f6glichen), DNS Poisoning (z. B. um Phishing zu erm\u00f6glichen) und die Offenlegung von Daten aus ungesch\u00fctzter Kommunikation."
}
],
"product_status": {
"known_affected": [
"2070",
"T006498",
"T010954",
"132177",
"67646",
"4035",
"T005205",
"T012215",
"T004914",
"T019358",
"697",
"T019316",
"T019338",
"T018746",
"398363",
"T000052",
"T008011",
"T000491",
"T006520",
"T015978",
"T016605",
"6368",
"T015357",
"T016423",
"T016785",
"T019302",
"T019304",
"T019303",
"2951",
"T002207",
"T019305",
"T000126",
"7107",
"T002543",
"T009493"
]
},
"release_date": "2021-05-11T22:00:00.000+00:00",
"title": "CVE-2020-26143"
},
{
"cve": "CVE-2020-26144",
"notes": [
{
"category": "description",
"text": "Die IEEE 802.11 (WiFi)-Spezifikation und zahlreiche Implementierungen dieser Spezifikation weisen mehrere Schwachstellen auf. Der 802.11-Frame-Aggregation-Funktionalit\u00e4t fehlen mehrere Pr\u00fcfungen und Validierungen (die von der Spezifikation nicht gefordert werden), wodurch bestimmte Teile eines Frames ungesch\u00fctzt bleiben. Bei der Fragmentierungsfunktion f\u00fcr 802.11-Frames fehlen \u00dcberpr\u00fcfungen, was mitunter zur Entgegennahme von unverschl\u00fcsselten Frames oder Fragmenten f\u00fchrt. Au\u00dferdem gibt es bei EAPoL (Extensible Authentication Protocol over Local Area Network) und TKIP (Temporal Key Integrity Protocol) mehrere produktspezifische Implementierungsfehler. Ein Angreifer innerhalb der WiFi-Funkreichweite kann diese Schwachstellen ausnutzen, um beliebigen Datenverkehr in ein drahtloses Netzwerk zu injizieren und Daten zu exfiltrieren. Zu den praktischen Angriffen geh\u00f6ren verschiedene Arten von Man-in-the-Middle-Angriffen (um die Ausnutzung anderer Schwachstellen zu erm\u00f6glichen), DNS Poisoning (z. B. um Phishing zu erm\u00f6glichen) und die Offenlegung von Daten aus ungesch\u00fctzter Kommunikation."
}
],
"product_status": {
"known_affected": [
"2070",
"T006498",
"T010954",
"132177",
"67646",
"4035",
"T005205",
"T012215",
"T004914",
"T019358",
"697",
"T019316",
"T019338",
"T018746",
"398363",
"T000052",
"T008011",
"T000491",
"T006520",
"T015978",
"T016605",
"6368",
"T015357",
"T016423",
"T016785",
"T019302",
"T019304",
"T019303",
"2951",
"T002207",
"T019305",
"T000126",
"7107",
"T002543",
"T009493"
]
},
"release_date": "2021-05-11T22:00:00.000+00:00",
"title": "CVE-2020-26144"
},
{
"cve": "CVE-2020-26145",
"notes": [
{
"category": "description",
"text": "Die IEEE 802.11 (WiFi)-Spezifikation und zahlreiche Implementierungen dieser Spezifikation weisen mehrere Schwachstellen auf. Der 802.11-Frame-Aggregation-Funktionalit\u00e4t fehlen mehrere Pr\u00fcfungen und Validierungen (die von der Spezifikation nicht gefordert werden), wodurch bestimmte Teile eines Frames ungesch\u00fctzt bleiben. Bei der Fragmentierungsfunktion f\u00fcr 802.11-Frames fehlen \u00dcberpr\u00fcfungen, was mitunter zur Entgegennahme von unverschl\u00fcsselten Frames oder Fragmenten f\u00fchrt. Au\u00dferdem gibt es bei EAPoL (Extensible Authentication Protocol over Local Area Network) und TKIP (Temporal Key Integrity Protocol) mehrere produktspezifische Implementierungsfehler. Ein Angreifer innerhalb der WiFi-Funkreichweite kann diese Schwachstellen ausnutzen, um beliebigen Datenverkehr in ein drahtloses Netzwerk zu injizieren und Daten zu exfiltrieren. Zu den praktischen Angriffen geh\u00f6ren verschiedene Arten von Man-in-the-Middle-Angriffen (um die Ausnutzung anderer Schwachstellen zu erm\u00f6glichen), DNS Poisoning (z. B. um Phishing zu erm\u00f6glichen) und die Offenlegung von Daten aus ungesch\u00fctzter Kommunikation."
}
],
"product_status": {
"known_affected": [
"2070",
"T006498",
"T010954",
"132177",
"67646",
"4035",
"T005205",
"T012215",
"T004914",
"T019358",
"697",
"T019316",
"T019338",
"T018746",
"398363",
"T000052",
"T008011",
"T000491",
"T006520",
"T015978",
"T016605",
"6368",
"T015357",
"T016423",
"T016785",
"T019302",
"T019304",
"T019303",
"2951",
"T002207",
"T019305",
"T000126",
"7107",
"T002543",
"T009493"
]
},
"release_date": "2021-05-11T22:00:00.000+00:00",
"title": "CVE-2020-26145"
},
{
"cve": "CVE-2020-26146",
"notes": [
{
"category": "description",
"text": "Die IEEE 802.11 (WiFi)-Spezifikation und zahlreiche Implementierungen dieser Spezifikation weisen mehrere Schwachstellen auf. Der 802.11-Frame-Aggregation-Funktionalit\u00e4t fehlen mehrere Pr\u00fcfungen und Validierungen (die von der Spezifikation nicht gefordert werden), wodurch bestimmte Teile eines Frames ungesch\u00fctzt bleiben. Bei der Fragmentierungsfunktion f\u00fcr 802.11-Frames fehlen \u00dcberpr\u00fcfungen, was mitunter zur Entgegennahme von unverschl\u00fcsselten Frames oder Fragmenten f\u00fchrt. Au\u00dferdem gibt es bei EAPoL (Extensible Authentication Protocol over Local Area Network) und TKIP (Temporal Key Integrity Protocol) mehrere produktspezifische Implementierungsfehler. Ein Angreifer innerhalb der WiFi-Funkreichweite kann diese Schwachstellen ausnutzen, um beliebigen Datenverkehr in ein drahtloses Netzwerk zu injizieren und Daten zu exfiltrieren. Zu den praktischen Angriffen geh\u00f6ren verschiedene Arten von Man-in-the-Middle-Angriffen (um die Ausnutzung anderer Schwachstellen zu erm\u00f6glichen), DNS Poisoning (z. B. um Phishing zu erm\u00f6glichen) und die Offenlegung von Daten aus ungesch\u00fctzter Kommunikation."
}
],
"product_status": {
"known_affected": [
"2070",
"T006498",
"T010954",
"132177",
"67646",
"4035",
"T005205",
"T012215",
"T004914",
"T019358",
"697",
"T019316",
"T019338",
"T018746",
"398363",
"T000052",
"T008011",
"T000491",
"T006520",
"T015978",
"T016605",
"6368",
"T015357",
"T016423",
"T016785",
"T019302",
"T019304",
"T019303",
"2951",
"T002207",
"T019305",
"T000126",
"7107",
"T002543",
"T009493"
]
},
"release_date": "2021-05-11T22:00:00.000+00:00",
"title": "CVE-2020-26146"
},
{
"cve": "CVE-2020-26147",
"notes": [
{
"category": "description",
"text": "Die IEEE 802.11 (WiFi)-Spezifikation und zahlreiche Implementierungen dieser Spezifikation weisen mehrere Schwachstellen auf. Der 802.11-Frame-Aggregation-Funktionalit\u00e4t fehlen mehrere Pr\u00fcfungen und Validierungen (die von der Spezifikation nicht gefordert werden), wodurch bestimmte Teile eines Frames ungesch\u00fctzt bleiben. Bei der Fragmentierungsfunktion f\u00fcr 802.11-Frames fehlen \u00dcberpr\u00fcfungen, was mitunter zur Entgegennahme von unverschl\u00fcsselten Frames oder Fragmenten f\u00fchrt. Au\u00dferdem gibt es bei EAPoL (Extensible Authentication Protocol over Local Area Network) und TKIP (Temporal Key Integrity Protocol) mehrere produktspezifische Implementierungsfehler. Ein Angreifer innerhalb der WiFi-Funkreichweite kann diese Schwachstellen ausnutzen, um beliebigen Datenverkehr in ein drahtloses Netzwerk zu injizieren und Daten zu exfiltrieren. Zu den praktischen Angriffen geh\u00f6ren verschiedene Arten von Man-in-the-Middle-Angriffen (um die Ausnutzung anderer Schwachstellen zu erm\u00f6glichen), DNS Poisoning (z. B. um Phishing zu erm\u00f6glichen) und die Offenlegung von Daten aus ungesch\u00fctzter Kommunikation."
}
],
"product_status": {
"known_affected": [
"2070",
"T006498",
"T010954",
"132177",
"67646",
"4035",
"T005205",
"T012215",
"T004914",
"T019358",
"697",
"T019316",
"T019338",
"T018746",
"398363",
"T000052",
"T008011",
"T000491",
"T006520",
"T015978",
"T016605",
"6368",
"T015357",
"T016423",
"T016785",
"T019302",
"T019304",
"T019303",
"2951",
"T002207",
"T019305",
"T000126",
"7107",
"T002543",
"T009493"
]
},
"release_date": "2021-05-11T22:00:00.000+00:00",
"title": "CVE-2020-26147"
}
]
}
wid-sec-w-2022-2069
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "IEEE 802.11 definiert die Wireless-LAN (WLAN) Standards.\r\nWPA2 ist der aktuelle Verschl\u00fcsselungsstandard f\u00fcr Wireless LAN.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in der IEEE 802.11 Spezifikation und zahlreichen Implementierungen ausnutzen, um Sicherheitsvorkehrungen zu umgehen, Netzwerkverkehr zu manipulieren und um Informationen offenzulegen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- UNIX\n- Linux\n- MacOS X\n- Windows\n- Android\n- iPhoneOS\n- CISCO Appliance\n- Juniper Appliance\n- Sonstiges\n- Hardware Appliance\n- Appliance",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2022-2069 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2021/wid-sec-w-2022-2069.json"
},
{
"category": "self",
"summary": "WID-SEC-2022-2069 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-2069"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:2809-1 vom 2023-07-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-July/015470.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-3380 vom 2023-04-01",
"url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html"
},
{
"category": "external",
"summary": "Wi-Fi Alliance security update vom 2021-05-11",
"url": "https://www.wi-fi.org/security-update-fragmentation"
},
{
"category": "external",
"summary": "FragAttacks Test Tool",
"url": "https://github.com/vanhoefm/fragattacks"
},
{
"category": "external",
"summary": "Aruba Product Security Advisory PSA-2021-011",
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-011.txt"
},
{
"category": "external",
"summary": "FragAttack Website",
"url": "https://www.fragattacks.com/"
},
{
"category": "external",
"summary": "Arista Security Advisory",
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63"
},
{
"category": "external",
"summary": "Microsoft Leitfaden f\u00fcr Sicherheitsupdates",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-24587"
},
{
"category": "external",
"summary": "Microsoft Leitfaden f\u00fcr Sicherheitsupdates",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-24588"
},
{
"category": "external",
"summary": "Microsoft Leitfaden f\u00fcr Sicherheitsupdates",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-26144"
},
{
"category": "external",
"summary": "Cisco Security Advisory cisco-sa-wifi-faf-22epcEWu",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00473",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html"
},
{
"category": "external",
"summary": "AVM Sicherheitshinweise vom 2021-05-11",
"url": "https://avm.de/service/aktuelle-sicherheitshinweise/"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA11170 vom 20201-05-11",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11170"
},
{
"category": "external",
"summary": "Linux Kernel Patches vom 2021-05-11",
"url": "https://lore.kernel.org/linux-wireless/20210511180259.159598-1-johannes@sipsolutions.net/"
},
{
"category": "external",
"summary": "Lenovo Security Advisory LEN-57316 vom 2021-05-11",
"url": "https://support.lenovo.com/de/de/product_security/ps500405-intel-proset-and-wireless-wifi-intel-vpro-csme-wifi-and-intel-killer-wifi-advisory"
},
{
"category": "external",
"summary": "BSI-Cyber-Sicherheitswarnung vom 2021-05-11",
"url": "https://www.bsi.bund.de/SharedDocs/Cybersicherheitswarnungen/DE/2021/2021-216748-1032.pdf?__blob=publicationFile\u0026v=3"
},
{
"category": "external",
"summary": "Deutsche Telekom Pressemeldung zu FragAttack vom 2021-05-12",
"url": "https://www.telekom.com/de/konzern/details/fragattack-luecke-im-wlan-standard-626972"
},
{
"category": "external",
"summary": "SYNOLOGY Security Advisory SYNOLOGY-SA-21:20 vom 2021-05-12",
"url": "https://www.synology.com/en-global/support/security/Synology_SA_21_20"
},
{
"category": "external",
"summary": "Zyxel security advisory for FragAttacks against WiFi products vom 2021-05-13",
"url": "https://www.zyxel.com/support/Zyxel_security_advisory_for_FragAttacks_against_WiFi_products.shtml"
},
{
"category": "external",
"summary": "EMC Security Advisory DSA-2021-100 vom 2021-05-17",
"url": "https://www.dell.com/support/kbdoc/de-de/000186331/dsa-2021-100-dell-client-platform-security-update-for-intel-wifi-software-vulnerabilitiesdsa-2021-100-dell-client-platform-security-update-for-intel-wifi-software-vulnerabilities"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:1912-1 vom 2021-06-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/008974.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:1913-1 vom 2021-06-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/008973.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:1899-1 vom 2021-06-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/008965.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:1888-1 vom 2021-06-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/008950.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:1889-1 vom 2021-06-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/008956.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:1887-1 vom 2021-06-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/008955.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:1890-1 vom 2021-06-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/008947.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:1891-1 vom 2021-06-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/008946.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:1977-1 vom 2021-06-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:1975-1 vom 2021-06-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-2690 vom 2021-06-23",
"url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-2689 vom 2021-06-23",
"url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4997-1 vom 2021-06-23",
"url": "https://ubuntu.com/security/notices/USN-4997-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4999-1 vom 2021-06-23",
"url": "https://ubuntu.com/security/notices/USN-4999-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5001-1 vom 2021-06-23",
"url": "https://ubuntu.com/security/notices/USN-5001-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5000-1 vom 2021-06-23",
"url": "https://ubuntu.com/security/notices/USN-5000-1"
},
{
"category": "external",
"summary": "HPE Security Bulletin",
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-hpesbnw04145en_us"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5000-2 vom 2021-06-25",
"url": "https://ubuntu.com/security/notices/USN-5000-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4997-2 vom 2021-06-25",
"url": "https://ubuntu.com/security/notices/USN-4997-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:2208-1 vom 2021-06-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/009103.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:14764-1 vom 2021-07-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009128.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:2324-1 vom 2021-07-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009141.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:2349-1 vom 2021-07-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009133.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:2321-1 vom 2021-07-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009132.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5018-1 vom 2021-07-21",
"url": "https://ubuntu.com/security/notices/USN-5018-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:2406-1 vom 2021-07-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:2427-1 vom 2021-07-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009190.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:2421-1 vom 2021-07-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:2422-1 vom 2021-07-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009191.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:2451-1 vom 2021-07-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2021-9406 vom 2021-08-10",
"url": "http://linux.oracle.com/errata/ELSA-2021-9406.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2021-9404 vom 2021-08-10",
"url": "http://linux.oracle.com/errata/ELSA-2021-9404.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2021-9452 vom 2021-09-21",
"url": "https://linux.oracle.com/errata/ELSA-2021-9452.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2021-9453 vom 2021-09-21",
"url": "https://linux.oracle.com/errata/ELSA-2021-9453.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2021-9459 vom 2021-09-22",
"url": "http://linux.oracle.com/errata/ELSA-2021-9459.html"
},
{
"category": "external",
"summary": "ORACLE OVMSA-2021-0031 vom 2021-09-22",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2021-September/001030.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2021-9473 vom 2021-10-08",
"url": "http://linux.oracle.com/errata/ELSA-2021-9473.html"
},
{
"category": "external",
"summary": "ORACLE OVMSA-2021-0035 vom 2021-10-12",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2021-October/001033.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:4140 vom 2021-11-10",
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:4356 vom 2021-11-09",
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2022-004 vom 2022-01-31",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2022-004.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2022-002 vom 2022-01-31",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2022-002.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5299-1 vom 2022-02-22",
"url": "https://ubuntu.com/security/notices/USN-5299-1"
},
{
"category": "external",
"summary": "FreeBSD Security Advisory FREEBSD-SA-22:02.WIFI vom 2022-03-15",
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-22:02.wifi.asc"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5343-1 vom 2022-03-22",
"url": "https://ubuntu.com/security/notices/USN-5343-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2022-9999 vom 2022-11-16",
"url": "http://linux.oracle.com/errata/ELSA-2022-9999.html"
},
{
"category": "external",
"summary": "HP Security Bulletin HPSBPI03763 vom 2022-12-15",
"url": "https://support.hp.com/de-de/document/ish_5610341-5610907-16/HPSBPI03763"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:0394-1 vom 2023-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-February/013743.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:0433-1 vom 2023-02-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-February/013801.html"
}
],
"source_lang": "en-US",
"title": "IEEE 802.11 (WLAN): Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2023-07-11T22:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:38:13.561+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2022-2069",
"initial_release_date": "2021-05-11T22:00:00.000+00:00",
"revision_history": [
{
"date": "2021-05-11T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2021-05-13T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Informationen von Zyxel aufgenommen"
},
{
"date": "2021-05-16T22:00:00.000+00:00",
"number": "3",
"summary": "Produktzuordnung bzgl. Arista korrigiert"
},
{
"date": "2021-06-08T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2021-06-09T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2021-06-15T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2021-06-22T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Debian und Ubuntu aufgenommen"
},
{
"date": "2021-06-27T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von HP und Ubuntu aufgenommen"
},
{
"date": "2021-06-30T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2021-07-13T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2021-07-14T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2021-07-20T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2021-07-21T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2021-07-22T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2021-08-09T22:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2021-09-20T22:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2021-09-22T22:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Oracle Linux und ORACLE aufgenommen"
},
{
"date": "2021-10-10T22:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2021-10-11T22:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von ORACLE aufgenommen"
},
{
"date": "2021-11-09T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2022-01-30T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2022-02-21T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-03-15T23:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von FreeBSD aufgenommen"
},
{
"date": "2022-03-22T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-11-16T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2022-12-14T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von HP aufgenommen"
},
{
"date": "2023-02-13T23:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-02-15T23:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-04-02T22:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2023-07-11T22:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von SUSE aufgenommen"
}
],
"status": "final",
"version": "30"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "AVM FRITZ!Box",
"product": {
"name": "AVM FRITZ!Box",
"product_id": "T002543",
"product_identification_helper": {
"cpe": "cpe:/o:avm:fritzos:-"
}
}
}
],
"category": "vendor",
"name": "AVM"
},
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Apple iOS",
"product": {
"name": "Apple iOS",
"product_id": "T005205",
"product_identification_helper": {
"cpe": "cpe:/o:apple:iphone_os:-"
}
}
},
{
"category": "product_name",
"name": "Apple iPadOS",
"product": {
"name": "Apple iPadOS",
"product_id": "T016605",
"product_identification_helper": {
"cpe": "cpe:/o:apple:ipados:-"
}
}
},
{
"category": "product_name",
"name": "Apple macOS",
"product": {
"name": "Apple macOS",
"product_id": "697",
"product_identification_helper": {
"cpe": "cpe:/o:apple:mac_os:-"
}
}
}
],
"category": "vendor",
"name": "Apple"
},
{
"branches": [
{
"category": "product_name",
"name": "Arista WiFi Access Point",
"product": {
"name": "Arista WiFi Access Point",
"product_id": "T019358",
"product_identification_helper": {
"cpe": "cpe:/h:arista:wifi_access_point:-"
}
}
}
],
"category": "vendor",
"name": "Arista"
},
{
"branches": [
{
"category": "product_name",
"name": "Aruba ArubaOS",
"product": {
"name": "Aruba ArubaOS",
"product_id": "T016785",
"product_identification_helper": {
"cpe": "cpe:/o:arubanetworks:arubaos:-"
}
}
}
],
"category": "vendor",
"name": "Aruba"
},
{
"branches": [
{
"category": "product_name",
"name": "Cisco Aironet Access Point",
"product": {
"name": "Cisco Aironet Access Point",
"product_id": "T012215",
"product_identification_helper": {
"cpe": "cpe:/o:cisco:aironet_access_point_software:-"
}
}
},
{
"category": "product_name",
"name": "Cisco Catalyst",
"product": {
"name": "Cisco Catalyst",
"product_id": "T000491",
"product_identification_helper": {
"cpe": "cpe:/h:cisco:catalyst:-"
}
}
},
{
"category": "product_name",
"name": "Cisco IP Phone",
"product": {
"name": "Cisco IP Phone",
"product_id": "2070",
"product_identification_helper": {
"cpe": "cpe:/h:cisco:ip_phone:-"
}
}
},
{
"branches": [
{
"category": "product_name",
"name": "Cisco WebEx Wireless Phone",
"product": {
"name": "Cisco WebEx Wireless Phone",
"product_id": "T018746",
"product_identification_helper": {
"cpe": "cpe:/a:cisco:webex:wireless_phone"
}
}
},
{
"category": "product_name",
"name": "Cisco WebEx Desk Series",
"product": {
"name": "Cisco WebEx Desk Series",
"product_id": "T019302",
"product_identification_helper": {
"cpe": "cpe:/a:cisco:webex:desk_series"
}
}
},
{
"category": "product_name",
"name": "Cisco WebEx Room Series",
"product": {
"name": "Cisco WebEx Room Series",
"product_id": "T019303",
"product_identification_helper": {
"cpe": "cpe:/a:cisco:webex:room_series"
}
}
},
{
"category": "product_name",
"name": "Cisco WebEx Board Series",
"product": {
"name": "Cisco WebEx Board Series",
"product_id": "T019304",
"product_identification_helper": {
"cpe": "cpe:/a:cisco:webex:board_series"
}
}
}
],
"category": "product_name",
"name": "WebEx"
},
{
"category": "product_name",
"name": "Cisco Wireless IP Phone",
"product": {
"name": "Cisco Wireless IP Phone",
"product_id": "T015978",
"product_identification_helper": {
"cpe": "cpe:/h:cisco:wireless_ip_phone:8821"
}
}
}
],
"category": "vendor",
"name": "Cisco"
},
{
"branches": [
{
"category": "product_name",
"name": "D-LINK Router",
"product": {
"name": "D-LINK Router",
"product_id": "T009493",
"product_identification_helper": {
"cpe": "cpe:/h:d-link:router:-"
}
}
}
],
"category": "vendor",
"name": "D-LINK"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Dell Computer",
"product": {
"name": "Dell Computer",
"product_id": "T006498",
"product_identification_helper": {
"cpe": "cpe:/o:dell:dell_computer:-"
}
}
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "FreeBSD Project FreeBSD OS",
"product": {
"name": "FreeBSD Project FreeBSD OS",
"product_id": "4035",
"product_identification_helper": {
"cpe": "cpe:/o:freebsd:freebsd:-"
}
}
}
],
"category": "vendor",
"name": "FreeBSD Project"
},
{
"branches": [
{
"category": "product_name",
"name": "Google Android",
"product": {
"name": "Google Android",
"product_id": "132177",
"product_identification_helper": {
"cpe": "cpe:/o:google:android:-"
}
}
}
],
"category": "vendor",
"name": "Google"
},
{
"branches": [
{
"category": "product_name",
"name": "HP LaserJet",
"product": {
"name": "HP LaserJet",
"product_id": "T000052",
"product_identification_helper": {
"cpe": "cpe:/h:hp:laserjet:p3015"
}
}
}
],
"category": "vendor",
"name": "HP"
},
{
"branches": [
{
"category": "product_name",
"name": "Intel PROSet Wireless WiFi Software",
"product": {
"name": "Intel PROSet Wireless WiFi Software",
"product_id": "T015357",
"product_identification_helper": {
"cpe": "cpe:/a:intel:proset_wireless:-"
}
}
}
],
"category": "vendor",
"name": "Intel"
},
{
"branches": [
{
"category": "product_name",
"name": "Juniper SRX Series",
"product": {
"name": "Juniper SRX Series",
"product_id": "T008011",
"product_identification_helper": {
"cpe": "cpe:/h:juniper:srx_service_gateways:-"
}
}
}
],
"category": "vendor",
"name": "Juniper"
},
{
"branches": [
{
"category": "product_name",
"name": "LANCOM Router",
"product": {
"name": "LANCOM Router",
"product_id": "T019305",
"product_identification_helper": {
"cpe": "cpe:/h:lancom:router:-"
}
}
}
],
"category": "vendor",
"name": "LANCOM"
},
{
"branches": [
{
"category": "product_name",
"name": "Lenovo Computer",
"product": {
"name": "Lenovo Computer",
"product_id": "T006520",
"product_identification_helper": {
"cpe": "cpe:/o:lenovo:lenovo_computer:-"
}
}
}
],
"category": "vendor",
"name": "Lenovo"
},
{
"branches": [
{
"category": "product_name",
"name": "Microsoft Windows",
"product": {
"name": "Microsoft Windows",
"product_id": "7107",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows:-"
}
}
}
],
"category": "vendor",
"name": "Microsoft"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "6368",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Specification WPA2",
"product": {
"name": "Specification WPA2",
"product_id": "T010954",
"product_identification_helper": {
"cpe": "cpe:/h:ieee:wpa2:-"
}
}
}
],
"category": "vendor",
"name": "Specification"
},
{
"branches": [
{
"category": "product_name",
"name": "Synology NAS",
"product": {
"name": "Synology NAS",
"product_id": "T016423",
"product_identification_helper": {
"cpe": "cpe:/h:synology:nas:-"
}
}
}
],
"category": "vendor",
"name": "Synology"
},
{
"branches": [
{
"category": "product_name",
"name": "Telekom Speedport",
"product": {
"name": "Telekom Speedport",
"product_id": "T019316",
"product_identification_helper": {
"cpe": "cpe:/h:telekom:speedport:-"
}
}
}
],
"category": "vendor",
"name": "Telekom"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
},
{
"branches": [
{
"category": "product_name",
"name": "Zyxel Firewall",
"product": {
"name": "Zyxel Firewall",
"product_id": "T019338",
"product_identification_helper": {
"cpe": "cpe:/h:zyxel:firewall:-"
}
}
}
],
"category": "vendor",
"name": "Zyxel"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-11264",
"notes": [
{
"category": "description",
"text": "Die IEEE 802.11 (WiFi)-Spezifikation und zahlreiche Implementierungen dieser Spezifikation weisen mehrere Schwachstellen auf. Der 802.11-Frame-Aggregation-Funktionalit\u00e4t fehlen mehrere Pr\u00fcfungen und Validierungen (die von der Spezifikation nicht gefordert werden), wodurch bestimmte Teile eines Frames ungesch\u00fctzt bleiben. Bei der Fragmentierungsfunktion f\u00fcr 802.11-Frames fehlen \u00dcberpr\u00fcfungen, was mitunter zur Entgegennahme von unverschl\u00fcsselten Frames oder Fragmenten f\u00fchrt. Au\u00dferdem gibt es bei EAPoL (Extensible Authentication Protocol over Local Area Network) und TKIP (Temporal Key Integrity Protocol) mehrere produktspezifische Implementierungsfehler. Ein Angreifer innerhalb der WiFi-Funkreichweite kann diese Schwachstellen ausnutzen, um beliebigen Datenverkehr in ein drahtloses Netzwerk zu injizieren und Daten zu exfiltrieren. Zu den praktischen Angriffen geh\u00f6ren verschiedene Arten von Man-in-the-Middle-Angriffen (um die Ausnutzung anderer Schwachstellen zu erm\u00f6glichen), DNS Poisoning (z. B. um Phishing zu erm\u00f6glichen) und die Offenlegung von Daten aus ungesch\u00fctzter Kommunikation."
}
],
"product_status": {
"known_affected": [
"2070",
"T006498",
"T010954",
"132177",
"67646",
"4035",
"T005205",
"T012215",
"T004914",
"T019358",
"697",
"T019316",
"T019338",
"T018746",
"398363",
"T000052",
"T008011",
"T000491",
"T006520",
"T015978",
"T016605",
"6368",
"T015357",
"T016423",
"T016785",
"T019302",
"T019304",
"T019303",
"2951",
"T002207",
"T019305",
"T000126",
"7107",
"T002543",
"T009493"
]
},
"release_date": "2021-05-11T22:00:00.000+00:00",
"title": "CVE-2020-11264"
},
{
"cve": "CVE-2020-11301",
"notes": [
{
"category": "description",
"text": "Die IEEE 802.11 (WiFi)-Spezifikation und zahlreiche Implementierungen dieser Spezifikation weisen mehrere Schwachstellen auf. Der 802.11-Frame-Aggregation-Funktionalit\u00e4t fehlen mehrere Pr\u00fcfungen und Validierungen (die von der Spezifikation nicht gefordert werden), wodurch bestimmte Teile eines Frames ungesch\u00fctzt bleiben. Bei der Fragmentierungsfunktion f\u00fcr 802.11-Frames fehlen \u00dcberpr\u00fcfungen, was mitunter zur Entgegennahme von unverschl\u00fcsselten Frames oder Fragmenten f\u00fchrt. Au\u00dferdem gibt es bei EAPoL (Extensible Authentication Protocol over Local Area Network) und TKIP (Temporal Key Integrity Protocol) mehrere produktspezifische Implementierungsfehler. Ein Angreifer innerhalb der WiFi-Funkreichweite kann diese Schwachstellen ausnutzen, um beliebigen Datenverkehr in ein drahtloses Netzwerk zu injizieren und Daten zu exfiltrieren. Zu den praktischen Angriffen geh\u00f6ren verschiedene Arten von Man-in-the-Middle-Angriffen (um die Ausnutzung anderer Schwachstellen zu erm\u00f6glichen), DNS Poisoning (z. B. um Phishing zu erm\u00f6glichen) und die Offenlegung von Daten aus ungesch\u00fctzter Kommunikation."
}
],
"product_status": {
"known_affected": [
"2070",
"T006498",
"T010954",
"132177",
"67646",
"4035",
"T005205",
"T012215",
"T004914",
"T019358",
"697",
"T019316",
"T019338",
"T018746",
"398363",
"T000052",
"T008011",
"T000491",
"T006520",
"T015978",
"T016605",
"6368",
"T015357",
"T016423",
"T016785",
"T019302",
"T019304",
"T019303",
"2951",
"T002207",
"T019305",
"T000126",
"7107",
"T002543",
"T009493"
]
},
"release_date": "2021-05-11T22:00:00.000+00:00",
"title": "CVE-2020-11301"
},
{
"cve": "CVE-2020-24586",
"notes": [
{
"category": "description",
"text": "Die IEEE 802.11 (WiFi)-Spezifikation und zahlreiche Implementierungen dieser Spezifikation weisen mehrere Schwachstellen auf. Der 802.11-Frame-Aggregation-Funktionalit\u00e4t fehlen mehrere Pr\u00fcfungen und Validierungen (die von der Spezifikation nicht gefordert werden), wodurch bestimmte Teile eines Frames ungesch\u00fctzt bleiben. Bei der Fragmentierungsfunktion f\u00fcr 802.11-Frames fehlen \u00dcberpr\u00fcfungen, was mitunter zur Entgegennahme von unverschl\u00fcsselten Frames oder Fragmenten f\u00fchrt. Au\u00dferdem gibt es bei EAPoL (Extensible Authentication Protocol over Local Area Network) und TKIP (Temporal Key Integrity Protocol) mehrere produktspezifische Implementierungsfehler. Ein Angreifer innerhalb der WiFi-Funkreichweite kann diese Schwachstellen ausnutzen, um beliebigen Datenverkehr in ein drahtloses Netzwerk zu injizieren und Daten zu exfiltrieren. Zu den praktischen Angriffen geh\u00f6ren verschiedene Arten von Man-in-the-Middle-Angriffen (um die Ausnutzung anderer Schwachstellen zu erm\u00f6glichen), DNS Poisoning (z. B. um Phishing zu erm\u00f6glichen) und die Offenlegung von Daten aus ungesch\u00fctzter Kommunikation."
}
],
"product_status": {
"known_affected": [
"2070",
"T006498",
"T010954",
"132177",
"67646",
"4035",
"T005205",
"T012215",
"T004914",
"T019358",
"697",
"T019316",
"T019338",
"T018746",
"398363",
"T000052",
"T008011",
"T000491",
"T006520",
"T015978",
"T016605",
"6368",
"T015357",
"T016423",
"T016785",
"T019302",
"T019304",
"T019303",
"2951",
"T002207",
"T019305",
"T000126",
"7107",
"T002543",
"T009493"
]
},
"release_date": "2021-05-11T22:00:00.000+00:00",
"title": "CVE-2020-24586"
},
{
"cve": "CVE-2020-24587",
"notes": [
{
"category": "description",
"text": "Die IEEE 802.11 (WiFi)-Spezifikation und zahlreiche Implementierungen dieser Spezifikation weisen mehrere Schwachstellen auf. Der 802.11-Frame-Aggregation-Funktionalit\u00e4t fehlen mehrere Pr\u00fcfungen und Validierungen (die von der Spezifikation nicht gefordert werden), wodurch bestimmte Teile eines Frames ungesch\u00fctzt bleiben. Bei der Fragmentierungsfunktion f\u00fcr 802.11-Frames fehlen \u00dcberpr\u00fcfungen, was mitunter zur Entgegennahme von unverschl\u00fcsselten Frames oder Fragmenten f\u00fchrt. Au\u00dferdem gibt es bei EAPoL (Extensible Authentication Protocol over Local Area Network) und TKIP (Temporal Key Integrity Protocol) mehrere produktspezifische Implementierungsfehler. Ein Angreifer innerhalb der WiFi-Funkreichweite kann diese Schwachstellen ausnutzen, um beliebigen Datenverkehr in ein drahtloses Netzwerk zu injizieren und Daten zu exfiltrieren. Zu den praktischen Angriffen geh\u00f6ren verschiedene Arten von Man-in-the-Middle-Angriffen (um die Ausnutzung anderer Schwachstellen zu erm\u00f6glichen), DNS Poisoning (z. B. um Phishing zu erm\u00f6glichen) und die Offenlegung von Daten aus ungesch\u00fctzter Kommunikation."
}
],
"product_status": {
"known_affected": [
"2070",
"T006498",
"T010954",
"132177",
"67646",
"4035",
"T005205",
"T012215",
"T004914",
"T019358",
"697",
"T019316",
"T019338",
"T018746",
"398363",
"T000052",
"T008011",
"T000491",
"T006520",
"T015978",
"T016605",
"6368",
"T015357",
"T016423",
"T016785",
"T019302",
"T019304",
"T019303",
"2951",
"T002207",
"T019305",
"T000126",
"7107",
"T002543",
"T009493"
]
},
"release_date": "2021-05-11T22:00:00.000+00:00",
"title": "CVE-2020-24587"
},
{
"cve": "CVE-2020-24588",
"notes": [
{
"category": "description",
"text": "Die IEEE 802.11 (WiFi)-Spezifikation und zahlreiche Implementierungen dieser Spezifikation weisen mehrere Schwachstellen auf. Der 802.11-Frame-Aggregation-Funktionalit\u00e4t fehlen mehrere Pr\u00fcfungen und Validierungen (die von der Spezifikation nicht gefordert werden), wodurch bestimmte Teile eines Frames ungesch\u00fctzt bleiben. Bei der Fragmentierungsfunktion f\u00fcr 802.11-Frames fehlen \u00dcberpr\u00fcfungen, was mitunter zur Entgegennahme von unverschl\u00fcsselten Frames oder Fragmenten f\u00fchrt. Au\u00dferdem gibt es bei EAPoL (Extensible Authentication Protocol over Local Area Network) und TKIP (Temporal Key Integrity Protocol) mehrere produktspezifische Implementierungsfehler. Ein Angreifer innerhalb der WiFi-Funkreichweite kann diese Schwachstellen ausnutzen, um beliebigen Datenverkehr in ein drahtloses Netzwerk zu injizieren und Daten zu exfiltrieren. Zu den praktischen Angriffen geh\u00f6ren verschiedene Arten von Man-in-the-Middle-Angriffen (um die Ausnutzung anderer Schwachstellen zu erm\u00f6glichen), DNS Poisoning (z. B. um Phishing zu erm\u00f6glichen) und die Offenlegung von Daten aus ungesch\u00fctzter Kommunikation."
}
],
"product_status": {
"known_affected": [
"2070",
"T006498",
"T010954",
"132177",
"67646",
"4035",
"T005205",
"T012215",
"T004914",
"T019358",
"697",
"T019316",
"T019338",
"T018746",
"398363",
"T000052",
"T008011",
"T000491",
"T006520",
"T015978",
"T016605",
"6368",
"T015357",
"T016423",
"T016785",
"T019302",
"T019304",
"T019303",
"2951",
"T002207",
"T019305",
"T000126",
"7107",
"T002543",
"T009493"
]
},
"release_date": "2021-05-11T22:00:00.000+00:00",
"title": "CVE-2020-24588"
},
{
"cve": "CVE-2020-26139",
"notes": [
{
"category": "description",
"text": "Die IEEE 802.11 (WiFi)-Spezifikation und zahlreiche Implementierungen dieser Spezifikation weisen mehrere Schwachstellen auf. Der 802.11-Frame-Aggregation-Funktionalit\u00e4t fehlen mehrere Pr\u00fcfungen und Validierungen (die von der Spezifikation nicht gefordert werden), wodurch bestimmte Teile eines Frames ungesch\u00fctzt bleiben. Bei der Fragmentierungsfunktion f\u00fcr 802.11-Frames fehlen \u00dcberpr\u00fcfungen, was mitunter zur Entgegennahme von unverschl\u00fcsselten Frames oder Fragmenten f\u00fchrt. Au\u00dferdem gibt es bei EAPoL (Extensible Authentication Protocol over Local Area Network) und TKIP (Temporal Key Integrity Protocol) mehrere produktspezifische Implementierungsfehler. Ein Angreifer innerhalb der WiFi-Funkreichweite kann diese Schwachstellen ausnutzen, um beliebigen Datenverkehr in ein drahtloses Netzwerk zu injizieren und Daten zu exfiltrieren. Zu den praktischen Angriffen geh\u00f6ren verschiedene Arten von Man-in-the-Middle-Angriffen (um die Ausnutzung anderer Schwachstellen zu erm\u00f6glichen), DNS Poisoning (z. B. um Phishing zu erm\u00f6glichen) und die Offenlegung von Daten aus ungesch\u00fctzter Kommunikation."
}
],
"product_status": {
"known_affected": [
"2070",
"T006498",
"T010954",
"132177",
"67646",
"4035",
"T005205",
"T012215",
"T004914",
"T019358",
"697",
"T019316",
"T019338",
"T018746",
"398363",
"T000052",
"T008011",
"T000491",
"T006520",
"T015978",
"T016605",
"6368",
"T015357",
"T016423",
"T016785",
"T019302",
"T019304",
"T019303",
"2951",
"T002207",
"T019305",
"T000126",
"7107",
"T002543",
"T009493"
]
},
"release_date": "2021-05-11T22:00:00.000+00:00",
"title": "CVE-2020-26139"
},
{
"cve": "CVE-2020-26140",
"notes": [
{
"category": "description",
"text": "Die IEEE 802.11 (WiFi)-Spezifikation und zahlreiche Implementierungen dieser Spezifikation weisen mehrere Schwachstellen auf. Der 802.11-Frame-Aggregation-Funktionalit\u00e4t fehlen mehrere Pr\u00fcfungen und Validierungen (die von der Spezifikation nicht gefordert werden), wodurch bestimmte Teile eines Frames ungesch\u00fctzt bleiben. Bei der Fragmentierungsfunktion f\u00fcr 802.11-Frames fehlen \u00dcberpr\u00fcfungen, was mitunter zur Entgegennahme von unverschl\u00fcsselten Frames oder Fragmenten f\u00fchrt. Au\u00dferdem gibt es bei EAPoL (Extensible Authentication Protocol over Local Area Network) und TKIP (Temporal Key Integrity Protocol) mehrere produktspezifische Implementierungsfehler. Ein Angreifer innerhalb der WiFi-Funkreichweite kann diese Schwachstellen ausnutzen, um beliebigen Datenverkehr in ein drahtloses Netzwerk zu injizieren und Daten zu exfiltrieren. Zu den praktischen Angriffen geh\u00f6ren verschiedene Arten von Man-in-the-Middle-Angriffen (um die Ausnutzung anderer Schwachstellen zu erm\u00f6glichen), DNS Poisoning (z. B. um Phishing zu erm\u00f6glichen) und die Offenlegung von Daten aus ungesch\u00fctzter Kommunikation."
}
],
"product_status": {
"known_affected": [
"2070",
"T006498",
"T010954",
"132177",
"67646",
"4035",
"T005205",
"T012215",
"T004914",
"T019358",
"697",
"T019316",
"T019338",
"T018746",
"398363",
"T000052",
"T008011",
"T000491",
"T006520",
"T015978",
"T016605",
"6368",
"T015357",
"T016423",
"T016785",
"T019302",
"T019304",
"T019303",
"2951",
"T002207",
"T019305",
"T000126",
"7107",
"T002543",
"T009493"
]
},
"release_date": "2021-05-11T22:00:00.000+00:00",
"title": "CVE-2020-26140"
},
{
"cve": "CVE-2020-26141",
"notes": [
{
"category": "description",
"text": "Die IEEE 802.11 (WiFi)-Spezifikation und zahlreiche Implementierungen dieser Spezifikation weisen mehrere Schwachstellen auf. Der 802.11-Frame-Aggregation-Funktionalit\u00e4t fehlen mehrere Pr\u00fcfungen und Validierungen (die von der Spezifikation nicht gefordert werden), wodurch bestimmte Teile eines Frames ungesch\u00fctzt bleiben. Bei der Fragmentierungsfunktion f\u00fcr 802.11-Frames fehlen \u00dcberpr\u00fcfungen, was mitunter zur Entgegennahme von unverschl\u00fcsselten Frames oder Fragmenten f\u00fchrt. Au\u00dferdem gibt es bei EAPoL (Extensible Authentication Protocol over Local Area Network) und TKIP (Temporal Key Integrity Protocol) mehrere produktspezifische Implementierungsfehler. Ein Angreifer innerhalb der WiFi-Funkreichweite kann diese Schwachstellen ausnutzen, um beliebigen Datenverkehr in ein drahtloses Netzwerk zu injizieren und Daten zu exfiltrieren. Zu den praktischen Angriffen geh\u00f6ren verschiedene Arten von Man-in-the-Middle-Angriffen (um die Ausnutzung anderer Schwachstellen zu erm\u00f6glichen), DNS Poisoning (z. B. um Phishing zu erm\u00f6glichen) und die Offenlegung von Daten aus ungesch\u00fctzter Kommunikation."
}
],
"product_status": {
"known_affected": [
"2070",
"T006498",
"T010954",
"132177",
"67646",
"4035",
"T005205",
"T012215",
"T004914",
"T019358",
"697",
"T019316",
"T019338",
"T018746",
"398363",
"T000052",
"T008011",
"T000491",
"T006520",
"T015978",
"T016605",
"6368",
"T015357",
"T016423",
"T016785",
"T019302",
"T019304",
"T019303",
"2951",
"T002207",
"T019305",
"T000126",
"7107",
"T002543",
"T009493"
]
},
"release_date": "2021-05-11T22:00:00.000+00:00",
"title": "CVE-2020-26141"
},
{
"cve": "CVE-2020-26142",
"notes": [
{
"category": "description",
"text": "Die IEEE 802.11 (WiFi)-Spezifikation und zahlreiche Implementierungen dieser Spezifikation weisen mehrere Schwachstellen auf. Der 802.11-Frame-Aggregation-Funktionalit\u00e4t fehlen mehrere Pr\u00fcfungen und Validierungen (die von der Spezifikation nicht gefordert werden), wodurch bestimmte Teile eines Frames ungesch\u00fctzt bleiben. Bei der Fragmentierungsfunktion f\u00fcr 802.11-Frames fehlen \u00dcberpr\u00fcfungen, was mitunter zur Entgegennahme von unverschl\u00fcsselten Frames oder Fragmenten f\u00fchrt. Au\u00dferdem gibt es bei EAPoL (Extensible Authentication Protocol over Local Area Network) und TKIP (Temporal Key Integrity Protocol) mehrere produktspezifische Implementierungsfehler. Ein Angreifer innerhalb der WiFi-Funkreichweite kann diese Schwachstellen ausnutzen, um beliebigen Datenverkehr in ein drahtloses Netzwerk zu injizieren und Daten zu exfiltrieren. Zu den praktischen Angriffen geh\u00f6ren verschiedene Arten von Man-in-the-Middle-Angriffen (um die Ausnutzung anderer Schwachstellen zu erm\u00f6glichen), DNS Poisoning (z. B. um Phishing zu erm\u00f6glichen) und die Offenlegung von Daten aus ungesch\u00fctzter Kommunikation."
}
],
"product_status": {
"known_affected": [
"2070",
"T006498",
"T010954",
"132177",
"67646",
"4035",
"T005205",
"T012215",
"T004914",
"T019358",
"697",
"T019316",
"T019338",
"T018746",
"398363",
"T000052",
"T008011",
"T000491",
"T006520",
"T015978",
"T016605",
"6368",
"T015357",
"T016423",
"T016785",
"T019302",
"T019304",
"T019303",
"2951",
"T002207",
"T019305",
"T000126",
"7107",
"T002543",
"T009493"
]
},
"release_date": "2021-05-11T22:00:00.000+00:00",
"title": "CVE-2020-26142"
},
{
"cve": "CVE-2020-26143",
"notes": [
{
"category": "description",
"text": "Die IEEE 802.11 (WiFi)-Spezifikation und zahlreiche Implementierungen dieser Spezifikation weisen mehrere Schwachstellen auf. Der 802.11-Frame-Aggregation-Funktionalit\u00e4t fehlen mehrere Pr\u00fcfungen und Validierungen (die von der Spezifikation nicht gefordert werden), wodurch bestimmte Teile eines Frames ungesch\u00fctzt bleiben. Bei der Fragmentierungsfunktion f\u00fcr 802.11-Frames fehlen \u00dcberpr\u00fcfungen, was mitunter zur Entgegennahme von unverschl\u00fcsselten Frames oder Fragmenten f\u00fchrt. Au\u00dferdem gibt es bei EAPoL (Extensible Authentication Protocol over Local Area Network) und TKIP (Temporal Key Integrity Protocol) mehrere produktspezifische Implementierungsfehler. Ein Angreifer innerhalb der WiFi-Funkreichweite kann diese Schwachstellen ausnutzen, um beliebigen Datenverkehr in ein drahtloses Netzwerk zu injizieren und Daten zu exfiltrieren. Zu den praktischen Angriffen geh\u00f6ren verschiedene Arten von Man-in-the-Middle-Angriffen (um die Ausnutzung anderer Schwachstellen zu erm\u00f6glichen), DNS Poisoning (z. B. um Phishing zu erm\u00f6glichen) und die Offenlegung von Daten aus ungesch\u00fctzter Kommunikation."
}
],
"product_status": {
"known_affected": [
"2070",
"T006498",
"T010954",
"132177",
"67646",
"4035",
"T005205",
"T012215",
"T004914",
"T019358",
"697",
"T019316",
"T019338",
"T018746",
"398363",
"T000052",
"T008011",
"T000491",
"T006520",
"T015978",
"T016605",
"6368",
"T015357",
"T016423",
"T016785",
"T019302",
"T019304",
"T019303",
"2951",
"T002207",
"T019305",
"T000126",
"7107",
"T002543",
"T009493"
]
},
"release_date": "2021-05-11T22:00:00.000+00:00",
"title": "CVE-2020-26143"
},
{
"cve": "CVE-2020-26144",
"notes": [
{
"category": "description",
"text": "Die IEEE 802.11 (WiFi)-Spezifikation und zahlreiche Implementierungen dieser Spezifikation weisen mehrere Schwachstellen auf. Der 802.11-Frame-Aggregation-Funktionalit\u00e4t fehlen mehrere Pr\u00fcfungen und Validierungen (die von der Spezifikation nicht gefordert werden), wodurch bestimmte Teile eines Frames ungesch\u00fctzt bleiben. Bei der Fragmentierungsfunktion f\u00fcr 802.11-Frames fehlen \u00dcberpr\u00fcfungen, was mitunter zur Entgegennahme von unverschl\u00fcsselten Frames oder Fragmenten f\u00fchrt. Au\u00dferdem gibt es bei EAPoL (Extensible Authentication Protocol over Local Area Network) und TKIP (Temporal Key Integrity Protocol) mehrere produktspezifische Implementierungsfehler. Ein Angreifer innerhalb der WiFi-Funkreichweite kann diese Schwachstellen ausnutzen, um beliebigen Datenverkehr in ein drahtloses Netzwerk zu injizieren und Daten zu exfiltrieren. Zu den praktischen Angriffen geh\u00f6ren verschiedene Arten von Man-in-the-Middle-Angriffen (um die Ausnutzung anderer Schwachstellen zu erm\u00f6glichen), DNS Poisoning (z. B. um Phishing zu erm\u00f6glichen) und die Offenlegung von Daten aus ungesch\u00fctzter Kommunikation."
}
],
"product_status": {
"known_affected": [
"2070",
"T006498",
"T010954",
"132177",
"67646",
"4035",
"T005205",
"T012215",
"T004914",
"T019358",
"697",
"T019316",
"T019338",
"T018746",
"398363",
"T000052",
"T008011",
"T000491",
"T006520",
"T015978",
"T016605",
"6368",
"T015357",
"T016423",
"T016785",
"T019302",
"T019304",
"T019303",
"2951",
"T002207",
"T019305",
"T000126",
"7107",
"T002543",
"T009493"
]
},
"release_date": "2021-05-11T22:00:00.000+00:00",
"title": "CVE-2020-26144"
},
{
"cve": "CVE-2020-26145",
"notes": [
{
"category": "description",
"text": "Die IEEE 802.11 (WiFi)-Spezifikation und zahlreiche Implementierungen dieser Spezifikation weisen mehrere Schwachstellen auf. Der 802.11-Frame-Aggregation-Funktionalit\u00e4t fehlen mehrere Pr\u00fcfungen und Validierungen (die von der Spezifikation nicht gefordert werden), wodurch bestimmte Teile eines Frames ungesch\u00fctzt bleiben. Bei der Fragmentierungsfunktion f\u00fcr 802.11-Frames fehlen \u00dcberpr\u00fcfungen, was mitunter zur Entgegennahme von unverschl\u00fcsselten Frames oder Fragmenten f\u00fchrt. Au\u00dferdem gibt es bei EAPoL (Extensible Authentication Protocol over Local Area Network) und TKIP (Temporal Key Integrity Protocol) mehrere produktspezifische Implementierungsfehler. Ein Angreifer innerhalb der WiFi-Funkreichweite kann diese Schwachstellen ausnutzen, um beliebigen Datenverkehr in ein drahtloses Netzwerk zu injizieren und Daten zu exfiltrieren. Zu den praktischen Angriffen geh\u00f6ren verschiedene Arten von Man-in-the-Middle-Angriffen (um die Ausnutzung anderer Schwachstellen zu erm\u00f6glichen), DNS Poisoning (z. B. um Phishing zu erm\u00f6glichen) und die Offenlegung von Daten aus ungesch\u00fctzter Kommunikation."
}
],
"product_status": {
"known_affected": [
"2070",
"T006498",
"T010954",
"132177",
"67646",
"4035",
"T005205",
"T012215",
"T004914",
"T019358",
"697",
"T019316",
"T019338",
"T018746",
"398363",
"T000052",
"T008011",
"T000491",
"T006520",
"T015978",
"T016605",
"6368",
"T015357",
"T016423",
"T016785",
"T019302",
"T019304",
"T019303",
"2951",
"T002207",
"T019305",
"T000126",
"7107",
"T002543",
"T009493"
]
},
"release_date": "2021-05-11T22:00:00.000+00:00",
"title": "CVE-2020-26145"
},
{
"cve": "CVE-2020-26146",
"notes": [
{
"category": "description",
"text": "Die IEEE 802.11 (WiFi)-Spezifikation und zahlreiche Implementierungen dieser Spezifikation weisen mehrere Schwachstellen auf. Der 802.11-Frame-Aggregation-Funktionalit\u00e4t fehlen mehrere Pr\u00fcfungen und Validierungen (die von der Spezifikation nicht gefordert werden), wodurch bestimmte Teile eines Frames ungesch\u00fctzt bleiben. Bei der Fragmentierungsfunktion f\u00fcr 802.11-Frames fehlen \u00dcberpr\u00fcfungen, was mitunter zur Entgegennahme von unverschl\u00fcsselten Frames oder Fragmenten f\u00fchrt. Au\u00dferdem gibt es bei EAPoL (Extensible Authentication Protocol over Local Area Network) und TKIP (Temporal Key Integrity Protocol) mehrere produktspezifische Implementierungsfehler. Ein Angreifer innerhalb der WiFi-Funkreichweite kann diese Schwachstellen ausnutzen, um beliebigen Datenverkehr in ein drahtloses Netzwerk zu injizieren und Daten zu exfiltrieren. Zu den praktischen Angriffen geh\u00f6ren verschiedene Arten von Man-in-the-Middle-Angriffen (um die Ausnutzung anderer Schwachstellen zu erm\u00f6glichen), DNS Poisoning (z. B. um Phishing zu erm\u00f6glichen) und die Offenlegung von Daten aus ungesch\u00fctzter Kommunikation."
}
],
"product_status": {
"known_affected": [
"2070",
"T006498",
"T010954",
"132177",
"67646",
"4035",
"T005205",
"T012215",
"T004914",
"T019358",
"697",
"T019316",
"T019338",
"T018746",
"398363",
"T000052",
"T008011",
"T000491",
"T006520",
"T015978",
"T016605",
"6368",
"T015357",
"T016423",
"T016785",
"T019302",
"T019304",
"T019303",
"2951",
"T002207",
"T019305",
"T000126",
"7107",
"T002543",
"T009493"
]
},
"release_date": "2021-05-11T22:00:00.000+00:00",
"title": "CVE-2020-26146"
},
{
"cve": "CVE-2020-26147",
"notes": [
{
"category": "description",
"text": "Die IEEE 802.11 (WiFi)-Spezifikation und zahlreiche Implementierungen dieser Spezifikation weisen mehrere Schwachstellen auf. Der 802.11-Frame-Aggregation-Funktionalit\u00e4t fehlen mehrere Pr\u00fcfungen und Validierungen (die von der Spezifikation nicht gefordert werden), wodurch bestimmte Teile eines Frames ungesch\u00fctzt bleiben. Bei der Fragmentierungsfunktion f\u00fcr 802.11-Frames fehlen \u00dcberpr\u00fcfungen, was mitunter zur Entgegennahme von unverschl\u00fcsselten Frames oder Fragmenten f\u00fchrt. Au\u00dferdem gibt es bei EAPoL (Extensible Authentication Protocol over Local Area Network) und TKIP (Temporal Key Integrity Protocol) mehrere produktspezifische Implementierungsfehler. Ein Angreifer innerhalb der WiFi-Funkreichweite kann diese Schwachstellen ausnutzen, um beliebigen Datenverkehr in ein drahtloses Netzwerk zu injizieren und Daten zu exfiltrieren. Zu den praktischen Angriffen geh\u00f6ren verschiedene Arten von Man-in-the-Middle-Angriffen (um die Ausnutzung anderer Schwachstellen zu erm\u00f6glichen), DNS Poisoning (z. B. um Phishing zu erm\u00f6glichen) und die Offenlegung von Daten aus ungesch\u00fctzter Kommunikation."
}
],
"product_status": {
"known_affected": [
"2070",
"T006498",
"T010954",
"132177",
"67646",
"4035",
"T005205",
"T012215",
"T004914",
"T019358",
"697",
"T019316",
"T019338",
"T018746",
"398363",
"T000052",
"T008011",
"T000491",
"T006520",
"T015978",
"T016605",
"6368",
"T015357",
"T016423",
"T016785",
"T019302",
"T019304",
"T019303",
"2951",
"T002207",
"T019305",
"T000126",
"7107",
"T002543",
"T009493"
]
},
"release_date": "2021-05-11T22:00:00.000+00:00",
"title": "CVE-2020-26147"
}
]
}
CERTFR-2021-AVI-500
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Realtime 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE MicroOS 5.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Public Cloud 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-26139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26139"
},
{
"name": "CVE-2020-24587",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24587"
},
{
"name": "CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"name": "CVE-2021-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
},
{
"name": "CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"name": "CVE-2021-3490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3490"
},
{
"name": "CVE-2020-24588",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24588"
},
{
"name": "CVE-2020-24586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24586"
},
{
"name": "CVE-2021-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0129"
},
{
"name": "CVE-2020-36386",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36386"
},
{
"name": "CVE-2020-36322",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36322"
},
{
"name": "CVE-2020-26558",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26558"
},
{
"name": "CVE-2021-3489",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3489"
},
{
"name": "CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"name": "CVE-2020-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26141"
},
{
"name": "CVE-2021-23134",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23134"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2021-28660",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28660"
},
{
"name": "CVE-2021-3491",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3491"
},
{
"name": "CVE-2021-33200",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33200"
},
{
"name": "CVE-2020-26145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26145"
}
],
"initial_release_date": "2021-07-01T00:00:00",
"last_revision_date": "2021-07-01T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-500",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-07-01T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service et une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212208-1 du 1 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212208-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212202-1 du 1 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212202-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212198-1 du 1 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212198-1/"
}
]
}
CERTFR-2022-AVI-299
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 21.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-42327",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42327"
},
{
"name": "CVE-2020-3702",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3702"
},
{
"name": "CVE-2021-31916",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31916"
},
{
"name": "CVE-2022-27666",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27666"
},
{
"name": "CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"name": "CVE-2021-45486",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45486"
},
{
"name": "CVE-2022-0330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0330"
},
{
"name": "CVE-2022-0185",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0185"
},
{
"name": "CVE-2022-0847",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0847"
},
{
"name": "CVE-2022-0516",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0516"
},
{
"name": "CVE-2021-37159",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37159"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2021-4090",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4090"
},
{
"name": "CVE-2020-12888",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12888"
},
{
"name": "CVE-2022-25636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25636"
},
{
"name": "CVE-2021-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
},
{
"name": "CVE-2021-43976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43976"
},
{
"name": "CVE-2021-42739",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42739"
},
{
"name": "CVE-2022-23960",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23960"
},
{
"name": "CVE-2022-0001",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0001"
},
{
"name": "CVE-2022-0492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0492"
},
{
"name": "CVE-2021-0935",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0935"
},
{
"name": "CVE-2022-1055",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1055"
},
{
"name": "CVE-2022-0435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0435"
},
{
"name": "CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"name": "CVE-2020-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26141"
},
{
"name": "CVE-2021-28964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28964"
},
{
"name": "CVE-2022-23222",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23222"
},
{
"name": "CVE-2021-39636",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39636"
},
{
"name": "CVE-2022-0742",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0742"
},
{
"name": "CVE-2020-26145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26145"
}
],
"initial_release_date": "2022-04-01T00:00:00",
"last_revision_date": "2022-04-01T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-299",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-04-01T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux\nd\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire, un d\u00e9ni de service et une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5357-2 du 31 mars 2022",
"url": "https://ubuntu.com/security/notices/USN-5357-2"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5361-1 du 01 avril 2022",
"url": "https://ubuntu.com/security/notices/USN-5361-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5362-1 du 01 avril 2022",
"url": "https://ubuntu.com/security/notices/USN-5362-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5358-2 du 31 mars 2022",
"url": "https://ubuntu.com/security/notices/USN-5358-2"
}
]
}
CERTFR-2021-AVI-492
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 21.04",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-26139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26139"
},
{
"name": "CVE-2020-24587",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24587"
},
{
"name": "CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"name": "CVE-2021-31440",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31440"
},
{
"name": "CVE-2021-3543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3543"
},
{
"name": "CVE-2020-24588",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24588"
},
{
"name": "CVE-2021-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23133"
},
{
"name": "CVE-2021-3506",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3506"
},
{
"name": "CVE-2020-24586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24586"
},
{
"name": "CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"name": "CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"name": "CVE-2020-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26141"
},
{
"name": "CVE-2021-23134",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23134"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2021-33200",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33200"
},
{
"name": "CVE-2021-31829",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31829"
},
{
"name": "CVE-2020-26145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26145"
}
],
"initial_release_date": "2021-06-29T00:00:00",
"last_revision_date": "2021-06-29T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-492",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-06-29T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux\nd\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire, un d\u00e9ni de service et une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-4997-2 du 25 juin 2021",
"url": "https://ubuntu.com/security/notices/USN-4997-2"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5000-2 du 25 juin 2021",
"url": "https://ubuntu.com/security/notices/USN-5000-2"
}
]
}
CERTFR-2022-AVI-124
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Système affecté | Lien vers l'avis éditeur |
|---|---|
| Advantage Navigator Energy & Sustainability | Lien |
| Advantage Navigator Software Proxy V6 | Lien |
| Building Operator Discovery Distribution for the Connect X200 Gateway | Lien |
| Building Operator Discovery Distribution for the Connect X300 Gateway | Lien |
| Building Twin - 360° Viewer | Lien |
| Capital | Lien |
| Cerberus DMS | Lien |
| CloudConnect 712 | Lien |
| COMOS | Lien |
| COMOS V10.2 | Lien |
| COMOS V10.3 | Lien |
| COMOS V10.4 | Lien |
| cRSP Operator Client Starter | Lien |
| cRSP | Lien |
| Desigo CC | Lien |
| Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller | Lien |
| Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller | Lien |
| Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller | Lien |
| Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller | Lien |
| Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller | Lien |
| Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 | Lien |
| E-Car OC Cloud Application | Lien |
| Energy Engage | Lien |
| EnergyIP Prepay V3.7 | Lien |
| EnergyIP Prepay V3.8 | Lien |
| EnergyIP | Lien |
| Enlighted Amaze | Lien |
| Enlighted Where | Lien |
| Geolus Shape Search V10 | Lien |
| Geolus Shape Search V11 | Lien |
| GMA-Manager | Lien |
| HEEDS Connect | Lien |
| HES UDIS | Lien |
| IE/AS-i Link PN IO | Lien |
| IE/PB-Link (incl. SIPLUS NET variants) | Lien |
| IE/PB LINK PN IO (incl. SIPLUS NET variants) | Lien |
| Industrial Edge Hub | Lien |
| Industrial Edge Management App (IEM-App) | Lien |
| Industrial Edge Management OS (IEM-OS) | Lien |
| jROS for Spectrum Power 4 | Lien |
| jROS for Spectrum Power 7 | Lien |
| JT2Go | Lien |
| KTK ATE530S | Lien |
| LOGO! CMR2020 | Lien |
| LOGO! CMR2040 | Lien |
| Mendix Applications | Lien |
| MindSphere App Management Cockpits (Developer& Operator) | Lien |
| MindSphere Asset Manager | Lien |
| Mindsphere Cloud Foundry | Lien |
| Mindsphere Cloud Platform | Lien |
| MindSphere IAM (User Management/ Settings) | Lien |
| MindSphere Integrated Data Lake | Lien |
| MindSphere Notification Service | Lien |
| MindSphere Predictive Learning | Lien |
| MindSphere Usage Transparency Service | Lien |
| MindSphere Visual Explorer | Lien |
| NXpower Monitor | Lien |
| NX | Lien |
| Opcenter EX CP Process Automation Control | Lien |
| Opcenter Execution Core Process Automation Control | Lien |
| Opcenter Intelligence | Lien |
| Operation Scheduler | Lien |
| PROFINET Driver for Controller | Lien |
| PSS(R)CAPE | Lien |
| RFID 181EIP | Lien |
| ROX II | Lien |
| RUGGEDCOM APE1404 Linux | Lien |
| RUGGEDCOM CROSSBOW Station Access Controller | Lien |
| RUGGEDCOM RCM1224 | Lien |
| RUGGEDCOM RM1224 LTE(4G) EU | Lien |
| RUGGEDCOM RM1224 LTE(4G) EU | Lien |
| RUGGEDCOM RM1224 LTE(4G) NAM | Lien |
| RUGGEDCOM RM1224 LTE(4G) NAM | Lien |
| RUGGEDCOM RM1224 | Lien |
| RUGGEDCOM RM1224 | Lien |
| RUGGEDCOM RM1224 | Lien |
| RUGGEDCOM ROX MX5000RE | Lien |
| RUGGEDCOM ROX MX5000 | Lien |
| RUGGEDCOM ROX RX1400 | Lien |
| RUGGEDCOM ROX RX1500 | Lien |
| RUGGEDCOM ROX RX1501 | Lien |
| RUGGEDCOM ROX RX1510 | Lien |
| RUGGEDCOM ROX RX1511 | Lien |
| RUGGEDCOM ROX RX1512 | Lien |
| RUGGEDCOM ROX RX1524 | Lien |
| RUGGEDCOM ROX RX1536 | Lien |
| RUGGEDCOM ROX RX5000 | Lien |
| RUGGEDCOM RX1400 VPE Debian Linux | Lien |
| RUGGEDCOM RX1400 VPE Linux CloudConnect | Lien |
| SCALANCE LPE9403 | Lien |
| SCALANCE M-800 / S615 | Lien |
| SCALANCE M-800 | Lien |
| SCALANCE M804PB | Lien |
| SCALANCE M804PB | Lien |
| SCALANCE M804PB | Lien |
| SCALANCE M804PB | Lien |
| SCALANCE M804PB | Lien |
| SCALANCE M812-1 ADSL-Router (Annex A) | Lien |
| SCALANCE M812-1 ADSL-Router (Annex A) | Lien |
| SCALANCE M812-1 ADSL-Router (Annex A) | Lien |
| SCALANCE M812-1 ADSL-Router (Annex A) | Lien |
| SCALANCE M812-1 ADSL-Router (Annex B) | Lien |
| SCALANCE M812-1 ADSL-Router (Annex B) | Lien |
| SCALANCE M812-1 ADSL-Router (Annex B) | Lien |
| SCALANCE M812-1 ADSL-Router (Annex B) | Lien |
| SCALANCE M812-1 ADSL-Router | Lien |
| SCALANCE M816-1 ADSL-Router (Annex A) | Lien |
| SCALANCE M816-1 ADSL-Router (Annex A) | Lien |
| SCALANCE M816-1 ADSL-Router (Annex A) | Lien |
| SCALANCE M816-1 ADSL-Router (Annex A) | Lien |
| SCALANCE M816-1 ADSL-Router (Annex B) | Lien |
| SCALANCE M816-1 ADSL-Router (Annex B) | Lien |
| SCALANCE M816-1 ADSL-Router (Annex B) | Lien |
| SCALANCE M816-1 ADSL-Router (Annex B) | Lien |
| SCALANCE M816-1 ADSL-Router | Lien |
| SCALANCE M826-2 SHDSL-Router | Lien |
| SCALANCE M826-2 SHDSL-Router | Lien |
| SCALANCE M826-2 SHDSL-Router | Lien |
| SCALANCE M826-2 SHDSL-Router | Lien |
| SCALANCE M826-2 SHDSL-Router | Lien |
| SCALANCE M874-2 | Lien |
| SCALANCE M874-2 | Lien |
| SCALANCE M874-2 | Lien |
| SCALANCE M874-2 | Lien |
| SCALANCE M874-2 | Lien |
| SCALANCE M874-3 | Lien |
| SCALANCE M874-3 | Lien |
| SCALANCE M874-3 | Lien |
| SCALANCE M874-3 | Lien |
| SCALANCE M874-3 | Lien |
| SCALANCE M875 | Lien |
| SCALANCE M876-3 (ROK) | Lien |
| SCALANCE M876-3 (ROK) | Lien |
| SCALANCE M876-3 (ROK) | Lien |
| SCALANCE M876-3 (ROK) | Lien |
| SCALANCE M876-3 (ROK) | Lien |
| SCALANCE M876-3 | Lien |
| SCALANCE M876-3 | Lien |
| SCALANCE M876-3 | Lien |
| SCALANCE M876-3 | Lien |
| SCALANCE M876-3 | Lien |
| SCALANCE M876-4 (EU) | Lien |
| SCALANCE M876-4 (EU) | Lien |
| SCALANCE M876-4 (EU) | Lien |
| SCALANCE M876-4 (EU) | Lien |
| SCALANCE M876-4 (EU) | Lien |
| SCALANCE M876-4 (NAM) | Lien |
| SCALANCE M876-4 (NAM) | Lien |
| SCALANCE M876-4 (NAM) | Lien |
| SCALANCE M876-4 (NAM) | Lien |
| SCALANCE M876-4 (NAM) | Lien |
| SCALANCE MUM856-1 (EU) | Lien |
| SCALANCE MUM856-1 (EU) | Lien |
| SCALANCE MUM856-1 (RoW) | Lien |
| SCALANCE MUM856-1 (RoW) | Lien |
| SCALANCE S602 | Lien |
| SCALANCE S602 | Lien |
| SCALANCE S602 | Lien |
| SCALANCE S612 | Lien |
| SCALANCE S612 | Lien |
| SCALANCE S612 | Lien |
| SCALANCE S615 | Lien |
| SCALANCE S615 | Lien |
| SCALANCE S615 | Lien |
| SCALANCE S615 | Lien |
| SCALANCE S615 | Lien |
| SCALANCE S623 | Lien |
| SCALANCE S623 | Lien |
| SCALANCE S623 | Lien |
| SCALANCE S627-2M | Lien |
| SCALANCE S627-2M | Lien |
| SCALANCE S627-2M | Lien |
| SCALANCE SC622-2C | Lien |
| SCALANCE SC622-2C | Lien |
| SCALANCE SC622-2C | Lien |
| SCALANCE SC622-2C | Lien |
| SCALANCE SC632-2C | Lien |
| SCALANCE SC632-2C | Lien |
| SCALANCE SC632-2C | Lien |
| SCALANCE SC632-2C | Lien |
| SCALANCE SC636-2C | Lien |
| SCALANCE SC636-2C | Lien |
| SCALANCE SC636-2C | Lien |
| SCALANCE SC636-2C | Lien |
| SCALANCE SC642-2C | Lien |
| SCALANCE SC642-2C | Lien |
| SCALANCE SC642-2C | Lien |
| SCALANCE SC642-2C | Lien |
| SCALANCE SC646-2C | Lien |
| SCALANCE SC646-2C | Lien |
| SCALANCE SC646-2C | Lien |
| SCALANCE SC646-2C | Lien |
| SCALANCE W-1700 IEEE 802.11ac family | Lien |
| SCALANCE W-1700 IEEE 802.11ac family | Lien |
| SCALANCE W-1700 IEEE 802.11ac family | Lien |
| SCALANCE W1748-1 M12 | Lien |
| SCALANCE W1748-1 M12 | Lien |
| SCALANCE W1750D | Lien |
| SCALANCE W1750D | Lien |
| SCALANCE W1788-1 M12 | Lien |
| SCALANCE W1788-1 M12 | Lien |
| SCALANCE W1788-2 EEC M12 | Lien |
| SCALANCE W1788-2 EEC M12 | Lien |
| SCALANCE W1788-2IA M12 | Lien |
| SCALANCE W1788-2IA M12 | Lien |
| SCALANCE W1788-2 M12 | Lien |
| SCALANCE W1788-2 M12 | Lien |
| SCALANCE W-700 IEEE 802.11n family | Lien |
| SCALANCE W-700 IEEE 802.11n family | Lien |
| SCALANCE W-700 IEEE 802.11n family | Lien |
| SCALANCE W-700 IEEE 802.11n family | Lien |
| SCALANCE W700 | Lien |
| SCALANCE W721-1 RJ45 | Lien |
| SCALANCE W721-1 RJ45 | Lien |
| SCALANCE W722-1 RJ45 | Lien |
| SCALANCE W722-1 RJ45 | Lien |
| SCALANCE W734-1 RJ45 | Lien |
| SCALANCE W734-1 RJ45 | Lien |
| SCALANCE W734-1 RJ45 (USA) | Lien |
| SCALANCE W734-1 RJ45 (USA) | Lien |
| SCALANCE W738-1 M12 | Lien |
| SCALANCE W738-1 M12 | Lien |
| SCALANCE W748-1 M12 | Lien |
| SCALANCE W748-1 M12 | Lien |
| SCALANCE W748-1 RJ45 | Lien |
| SCALANCE W748-1 RJ45 | Lien |
| SCALANCE W761-1 RJ45 | Lien |
| SCALANCE W761-1 RJ45 | Lien |
| SCALANCE W774-1 M12 EEC | Lien |
| SCALANCE W774-1 M12 EEC | Lien |
| SCALANCE W774-1 RJ45 | Lien |
| SCALANCE W774-1 RJ45 | Lien |
| SCALANCE W774-1 RJ45 (USA) | Lien |
| SCALANCE W774-1 RJ45 (USA) | Lien |
| SCALANCE W778-1 M12 EEC | Lien |
| SCALANCE W778-1 M12 EEC | Lien |
| SCALANCE W778-1 M12 EEC (USA) | Lien |
| SCALANCE W778-1 M12 EEC (USA) | Lien |
| SCALANCE W778-1 M12 | Lien |
| SCALANCE W778-1 M12 | Lien |
| SCALANCE W786-1 RJ45 | Lien |
| SCALANCE W786-1 RJ45 | Lien |
| SCALANCE W786-2IA RJ45 | Lien |
| SCALANCE W786-2IA RJ45 | Lien |
| SCALANCE W786-2 RJ45 | Lien |
| SCALANCE W786-2 RJ45 | Lien |
| SCALANCE W786-2 SFP | Lien |
| SCALANCE W786-2 SFP | Lien |
| SCALANCE W788-1 M12 | Lien |
| SCALANCE W788-1 M12 | Lien |
| SCALANCE W788-1 RJ45 | Lien |
| SCALANCE W788-1 RJ45 | Lien |
| SCALANCE W788-2 M12 EEC | Lien |
| SCALANCE W788-2 M12 EEC | Lien |
| SCALANCE W788-2 M12 | Lien |
| SCALANCE W788-2 M12 | Lien |
| SCALANCE W788-2 RJ45 | Lien |
| SCALANCE W788-2 RJ45 | Lien |
| SCALANCE WAM763-1 | Lien |
| SCALANCE WAM766-1 6GHz | Lien |
| SCALANCE WAM766-1 6GHz | Lien |
| SCALANCE WAM766-1 EEC 6GHz | Lien |
| SCALANCE WAM766-1 EEC 6GHz | Lien |
| SCALANCE WAM766-1 EEC | Lien |
| SCALANCE WAM766-1 EEC | Lien |
| SCALANCE WAM766-1 | Lien |
| SCALANCE WAM766-1 | Lien |
| SCALANCE WLC711 | Lien |
| SCALANCE WLC712 | Lien |
| SCALANCE WUM763-1 | Lien |
| SCALANCE WUM766-1 6GHz | Lien |
| SCALANCE WUM766-1 6GHz | Lien |
| SCALANCE WUM766-1 | Lien |
| SCALANCE WUM766-1 | Lien |
| SCALANCE X200-4 P IRT | Lien |
| SCALANCE X200-4 P IRT | Lien |
| SCALANCE X-200IRT (incl. SIPLUS NET variants) | Lien |
| SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) | Lien |
| SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) | Lien |
| SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) | Lien |
| SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) | Lien |
| SCALANCE X-200 switch family (incl. SIPLUS NET variants) | Lien |
| SCALANCE X-200 switch family (incl. SIPLUS NET variants) | Lien |
| SCALANCE X-200 switch family (incl. SIPLUS NET variants) | Lien |
| SCALANCE X-200 switch family (incl. SIPLUS NET variants) | Lien |
| SCALANCE X201-3P IRT PRO | Lien |
| SCALANCE X201-3P IRT PRO | Lien |
| SCALANCE X201-3P IRT | Lien |
| SCALANCE X201-3P IRT | Lien |
| SCALANCE X202-2 IRT | Lien |
| SCALANCE X202-2 IRT | Lien |
| SCALANCE X202-2P IRT (incl. SIPLUS NET variant) | Lien |
| SCALANCE X202-2P IRT (incl. SIPLUS NET variant) | Lien |
| SCALANCE X202-2P IRT PRO | Lien |
| SCALANCE X202-2P IRT PRO | Lien |
| SCALANCE X204-2FM | Lien |
| SCALANCE X204-2FM | Lien |
| SCALANCE X204-2 (incl. SIPLUS NET variant) | Lien |
| SCALANCE X204-2LD (incl. SIPLUS NET variant) | Lien |
| SCALANCE X204-2LD | Lien |
| SCALANCE X204-2LD TS | Lien |
| SCALANCE X204-2LD TS | Lien |
| SCALANCE X204-2 | Lien |
| SCALANCE X204-2TS | Lien |
| SCALANCE X204-2TS | Lien |
| SCALANCE X204 IRT PRO | Lien |
| SCALANCE X204 IRT PRO | Lien |
| SCALANCE X204 IRT | Lien |
| SCALANCE X204 IRT | Lien |
| SCALANCE X204RNA EEC (HSR) | Lien |
| SCALANCE X204RNA EEC (HSR) | Lien |
| SCALANCE X204RNA EEC (PRP/HSR) | Lien |
| SCALANCE X204RNA EEC (PRP/HSR) | Lien |
| SCALANCE X204RNA EEC (PRP) | Lien |
| SCALANCE X204RNA EEC (PRP) | Lien |
| SCALANCE X204RNA (HSR) | Lien |
| SCALANCE X204RNA (HSR) | Lien |
| SCALANCE X204RNA (PRP) | Lien |
| SCALANCE X204RNA (PRP) | Lien |
| SCALANCE X206-1LD (incl. SIPLUS NET variant) | Lien |
| SCALANCE X206-1LD | Lien |
| SCALANCE X206-1 | Lien |
| SCALANCE X206-1 | Lien |
| SCALANCE X208 (incl. SIPLUS NET variant) | Lien |
| SCALANCE X208PRO | Lien |
| SCALANCE X208PRO | Lien |
| SCALANCE X208 | Lien |
| SCALANCE X212-2LD | Lien |
| SCALANCE X212-2LD | Lien |
| SCALANCE X212-2 | Lien |
| SCALANCE X212-2 | Lien |
| SCALANCE X216 | Lien |
| SCALANCE X216 | Lien |
| SCALANCE X224 | Lien |
| SCALANCE X224 | Lien |
| SCALANCE X-300 (incl. X408 and SIPLUS NET variants) | Lien |
| SCALANCE X-300 switch family (incl. SIPLUS NET variants) | Lien |
| SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants) | Lien |
| SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants) | Lien |
| SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants) | Lien |
| SCALANCE X302-7 EEC (230V coated) | Lien |
| SCALANCE X302-7 EEC (230V) | Lien |
| SCALANCE X302-7 EEC (24V coated) | Lien |
| SCALANCE X302-7 EEC (24V) | Lien |
| SCALANCE X302-7 EEC (2x 230V coated) | Lien |
| SCALANCE X302-7 EEC (2x 230V) | Lien |
| SCALANCE X302-7 EEC (2x 24V coated) | Lien |
| SCALANCE X302-7 EEC (2x 24V) | Lien |
| SCALANCE X302-7EEC | Lien |
| SCALANCE X304-2FE | Lien |
| SCALANCE X304-2FE | Lien |
| SCALANCE X306-1LD FE | Lien |
| SCALANCE X306-1LDFE | Lien |
| SCALANCE X307-2 EEC (230V coated) | Lien |
| SCALANCE X307-2 EEC (230V) | Lien |
| SCALANCE X307-2 EEC (24V coated) | Lien |
| SCALANCE X307-2 EEC (24V) | Lien |
| SCALANCE X307-2 EEC (2x 230V coated) | Lien |
| SCALANCE X307-2 EEC (2x 230V) | Lien |
| SCALANCE X307-2 EEC (2x 24V coated) | Lien |
| SCALANCE X307-2 EEC (2x 24V) | Lien |
| SCALANCE X307-2EEC | Lien |
| SCALANCE X307-3LD | Lien |
| SCALANCE X307-3LD | Lien |
| SCALANCE X307-3 | Lien |
| SCALANCE X307-3 | Lien |
| SCALANCE X308-2 (incl. SIPLUS NET variant) | Lien |
| SCALANCE X308-2LD | Lien |
| SCALANCE X308-2LD | Lien |
| SCALANCE X308-2LH+ | Lien |
| SCALANCE X308-2LH | Lien |
| SCALANCE X308-2LH+ | Lien |
| SCALANCE X308-2LH | Lien |
| SCALANCE X308-2M PoE | Lien |
| SCALANCE X308-2M PoE | Lien |
| SCALANCE X308-2M | Lien |
| SCALANCE X308-2M | Lien |
| SCALANCE X308-2M TS | Lien |
| SCALANCE X308-2M TS | Lien |
| SCALANCE X308-2 | Lien |
| SCALANCE X310FE | Lien |
| SCALANCE X310FE | Lien |
| SCALANCE X310 | Lien |
| SCALANCE X310 | Lien |
| SCALANCE X320-1-2LD FE | Lien |
| SCALANCE X320-1 FE | Lien |
| SCALANCE X320-1FE | Lien |
| SCALANCE X320-3LDFE | Lien |
| SCALANCE X408-2 | Lien |
| SCALANCE X408 | Lien |
| SCALANCE X414 | Lien |
| SCALANCE XB-200 | Lien |
| SCALANCE XB-200 | Lien |
| SCALANCE XB-200 | Lien |
| SCALANCE XC-200 | Lien |
| SCALANCE XC-200 | Lien |
| SCALANCE XC-200 | Lien |
| SCALANCE XF-200BA | Lien |
| SCALANCE XF-200BA | Lien |
| SCALANCE XF-200BA | Lien |
| SCALANCE XF201-3P IRT | Lien |
| SCALANCE XF201-3P IRT | Lien |
| SCALANCE XF202-2P IRT | Lien |
| SCALANCE XF202-2P IRT | Lien |
| SCALANCE XF204-2BA IRT | Lien |
| SCALANCE XF204-2BA IRT | Lien |
| SCALANCE XF204-2 (incl. SIPLUS NET variant) | Lien |
| SCALANCE XF204-2 | Lien |
| SCALANCE XF204 IRT | Lien |
| SCALANCE XF204 IRT | Lien |
| SCALANCE XF204 | Lien |
| SCALANCE XF204 | Lien |
| SCALANCE XF206-1 | Lien |
| SCALANCE XF206-1 | Lien |
| SCALANCE XF208 | Lien |
| SCALANCE XF208 | Lien |
| SCALANCE XM-400 Family | Lien |
| SCALANCE XM400 | Lien |
| SCALANCE XM-400 | Lien |
| SCALANCE XM-400 | Lien |
| SCALANCE XP-200 | Lien |
| SCALANCE XP-200 | Lien |
| SCALANCE XP-200 | Lien |
| SCALANCE XR-300WG | Lien |
| SCALANCE XR-300WG | Lien |
| SCALANCE XR-300WG | Lien |
| SCALANCE XR324-12M (230V ports on front) | Lien |
| SCALANCE XR324-12M (230V ports on rear) | Lien |
| SCALANCE XR324-12M (24V ports on front) | Lien |
| SCALANCE XR324-12M (24V ports on rear) | Lien |
| SCALANCE XR324-12M | Lien |
| SCALANCE XR324-12M TS (24V) | Lien |
| SCALANCE XR324-12M TS | Lien |
| SCALANCE XR324-4M EEC (100-240VAC/60-250VDC ports on front) | Lien |
| SCALANCE XR324-4M EEC (100-240VAC/60-250VDC ports on rear) | Lien |
| SCALANCE XR324-4M EEC (24V ports on front) | Lien |
| SCALANCE XR324-4M EEC (24V ports on rear) | Lien |
| SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC ports on front) | Lien |
| SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC ports on rear) | Lien |
| SCALANCE XR324-4M EEC | Lien |
| SCALANCE XR324-4M PoE | Lien |
| SCALANCE XR324-4M PoE TS | Lien |
| SCALANCE XR-500 Family | Lien |
| SCALANCE XR-500 Family | Lien |
| SCALANCE XR500 | Lien |
| SCALANCE XR-500 | Lien |
| SENTRON 3VA COM100/800 | Lien |
| SENTRON 3VA DSP800 | Lien |
| SENTRON PAC2200 (with CLP Approval) | Lien |
| SENTRON PAC2200 (with MID Approval) | Lien |
| SENTRON PAC2200 (without MID Approval) | Lien |
| SENTRON PAC3200 | Lien |
| SENTRON PAC3200T | Lien |
| SENTRON PAC3220 | Lien |
| SENTRON PAC4200 | Lien |
| SENTRON powermanager V4 | Lien |
| SICAM 230 | Lien |
| SICAM TOOLBOX II | Lien |
| SIDOOR ATD430W | Lien |
| SIDOOR ATE530S COATED | Lien |
| SIDOOR ATE531S | Lien |
| SIGUARD DSA | Lien |
| SIMATIC CFU PA | Lien |
| SIMATIC CFU PA | Lien |
| SIMATIC Cloud Connect 7 CC712 | Lien |
| SIMATIC Cloud Connect 7 CC716 | Lien |
| SIMATIC CM 1542-1 | Lien |
| SIMATIC CM 1542-1 | Lien |
| SIMATIC CM 1542-1 | Lien |
| SIMATIC CM 1542SP-1 | Lien |
| SIMATIC Compact Field Unit | Lien |
| SIMATIC CP 1242-7C | Lien |
| SIMATIC CP 1242-7 GPRS V2 | Lien |
| SIMATIC CP 1242-7 GPRS V2 | Lien |
| SIMATIC CP 1242-7 GPRS V2 | Lien |
| SIMATIC CP 1243-1 DNP3 (incl. SIPLUS variants) | Lien |
| SIMATIC CP 1243-1 IEC (incl. SIPLUS variants) | Lien |
| SIMATIC CP 1243-1 (incl. SIPLUS variants) | Lien |
| SIMATIC CP 1243-1 (incl. SIPLUS variants) | Lien |
| SIMATIC CP 1243-1 IRC (incl. SIPLUS variants) | Lien |
| SIMATIC CP 1243-1 | Lien |
| SIMATIC CP 1243-1 | Lien |
| SIMATIC CP 1243-1 | Lien |
| SIMATIC CP 1243-7 LTE EU | Lien |
| SIMATIC CP 1243-7 LTE EU | Lien |
| SIMATIC CP 1243-7 LTE EU | Lien |
| SIMATIC CP 1243-7 LTE EU | Lien |
| SIMATIC CP 1243-7 LTE US | Lien |
| SIMATIC CP 1243-7 LTE US | Lien |
| SIMATIC CP 1243-7 LTE US | Lien |
| SIMATIC CP 1243-7 LTE US | Lien |
| SIMATIC CP 1243-8 IRC | Lien |
| SIMATIC CP 1243-8 IRC | Lien |
| SIMATIC CP 1243-8 IRC | Lien |
| SIMATIC CP 1243-8 IRC | Lien |
| SIMATIC CP 1542SP-1 IRC (incl. SIPLUS variants) | Lien |
| SIMATIC CP 1542SP-1 IRC (incl. SIPLUS variants) | Lien |
| SIMATIC CP 1542SP-1 IRC (incl. SIPLUS variants) | Lien |
| SIMATIC CP 1542SP-1 IRC | Lien |
| SIMATIC CP 1542SP-1 | Lien |
| SIMATIC CP 1542SP-1 | Lien |
| SIMATIC CP 1542SP-1 | Lien |
| SIMATIC CP 1543-1 (incl. SIPLUS variants) | Lien |
| SIMATIC CP 1543-1 | Lien |
| SIMATIC CP 1543-1 | Lien |
| SIMATIC CP 1543-1 | Lien |
| SIMATIC CP 1543-1 | Lien |
| SIMATIC CP 1543SP-1 (incl. SIPLUS variants) | Lien |
| SIMATIC CP 1543SP-1 (incl. SIPLUS variants) | Lien |
| SIMATIC CP 1543SP-1 | Lien |
| SIMATIC CP 1543SP-1 | Lien |
| SIMATIC CP 1545-1 | Lien |
| SIMATIC CP 1545-1 | Lien |
| SIMATIC CP 1545-1 | Lien |
| SIMATIC CP 1604 | Lien |
| SIMATIC CP 1604 | Lien |
| SIMATIC CP 1616 and CP 1604 | Lien |
| SIMATIC CP1616/CP1604 | Lien |
| SIMATIC CP 1616 | Lien |
| SIMATIC CP 1616 | Lien |
| SIMATIC CP 1623 | Lien |
| SIMATIC CP 1623 | Lien |
| SIMATIC CP1626 | Lien |
| SIMATIC CP 1626 | Lien |
| SIMATIC CP 1628 | Lien |
| SIMATIC CP 1628 | Lien |
| SIMATIC CP 343-1 Advanced (incl. SIPLUS variants) | Lien |
| SIMATIC CP 343-1 Advanced (incl. SIPLUS variants) | Lien |
| SIMATIC CP 343-1 Advanced | Lien |
| SIMATIC CP 343-1 Advanced | Lien |
| SIMATIC CP 343-1 Advanced | Lien |
| SIMATIC CP 343-1 ERPC | Lien |
| SIMATIC CP 343-1 (incl. SIPLUS variants) | Lien |
| SIMATIC CP 343-1 Lean (incl. SIPLUS variants) | Lien |
| SIMATIC CP 343-1 Lean | Lien |
| SIMATIC CP 343-1 | Lien |
| SIMATIC CP 442-1 RNA | Lien |
| SIMATIC CP 442-1 RNA | Lien |
| SIMATIC CP 443-1 Advanced (incl. SIPLUS variants) | Lien |
| SIMATIC CP 443-1 Advanced (incl. SIPLUS variants) | Lien |
| SIMATIC CP 443-1 Advanced (incl. SIPLUS variants) | Lien |
| SIMATIC CP 443-1 Advanced | Lien |
| SIMATIC CP 443-1 Advanced | Lien |
| SIMATIC CP 443-1 Advanced | Lien |
| SIMATIC CP 443-1 (incl. SIPLUS variants) | Lien |
| SIMATIC CP 443-1 (incl. SIPLUS variants) | Lien |
| SIMATIC CP 443-1 (incl. SIPLUS variants) | Lien |
| SIMATIC CP 443-1 OPC UA | Lien |
| SIMATIC CP 443-1 OPC UA | Lien |
| SIMATIC CP 443-1 OPC UA | Lien |
| SIMATIC CP 443-1 OPC UA | Lien |
| SIMATIC CP 443-1 OPC UA | Lien |
| SIMATIC CP 443-1 OPC UA | Lien |
| SIMATIC CP 443-1 OPC UA | Lien |
| SIMATIC CP 443-1 RNA | Lien |
| SIMATIC CP 443-1 RNA | Lien |
| SIMATIC CP 443-1 | Lien |
| SIMATIC CP 443-1 | Lien |
| SIMATIC CP 443-1 | Lien |
| SIMATIC DK-16xx PN IO | Lien |
| SIMATIC Drive Controller family | Lien |
| SIMATIC Drive Controller family | Lien |
| SIMATIC ET200AL IM 157-1 PN | Lien |
| SIMATIC ET200AL | Lien |
| SIMATIC ET200AL | Lien |
| SIMATIC ET200AL | Lien |
| SIMATIC ET200ecoPN 16DI DC24V 8xM12 | Lien |
| SIMATIC ET200ecoPN 16DI DC24V 8xM12 | Lien |
| SIMATIC ET200ecoPN 16DI DC24V 8xM12 | Lien |
| SIMATIC ET200ecoPN 16DI DC24V 8xM12 | Lien |
| SIMATIC ET200ecoPN 16DI DC24V 8xM12 | Lien |
| SIMATIC ET200ecoPN 16DO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 16DO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 16DO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 16DO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 16DO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 4AO U/I 4xM12 | Lien |
| SIMATIC ET200ecoPN 4AO U/I 4xM12 | Lien |
| SIMATIC ET200ecoPN 4AO U/I 4xM12 | Lien |
| SIMATIC ET200ecoPN 4AO U/I 4xM12 | Lien |
| SIMATIC ET200ecoPN 4AO U/I 4xM12 | Lien |
| SIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12 | Lien |
| SIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12 | Lien |
| SIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12 | Lien |
| SIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12 | Lien |
| SIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12 | Lien |
| SIMATIC ET200ecoPN 8AI RTD/TC 8xM12 | Lien |
| SIMATIC ET200ecoPN 8AI RTD/TC 8xM12 | Lien |
| SIMATIC ET200ecoPN 8AI RTD/TC 8xM12 | Lien |
| SIMATIC ET200ecoPN 8AI RTD/TC 8xM12 | Lien |
| SIMATIC ET200ecoPN 8AI RTD/TC 8xM12 | Lien |
| SIMATIC ET200ecoPN 8DI DC24V 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DI DC24V 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DI DC24V 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DI DC24V 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DI DC24V 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DI DC24V 8xM12 | Lien |
| SIMATIC ET200ecoPN 8DI DC24V 8xM12 | Lien |
| SIMATIC ET200ecoPN 8DI DC24V 8xM12 | Lien |
| SIMATIC ET200ecoPN 8DI DC24V 8xM12 | Lien |
| SIMATIC ET200ecoPN 8DI DC24V 8xM12 | Lien |
| SIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/05A 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/05A 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/05A 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/05A 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/05A 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/13A 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/13A 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/13A 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/13A 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/13A 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12 | Lien |
| SIMATIC ET200ecoPN: IO-Link Master | Lien |
| SIMATIC ET200ecoPN: IO-Link Master | Lien |
| SIMATIC ET200ecoPN: IO-Link Master | Lien |
| SIMATIC ET200ecoPN: IO-Link Master | Lien |
| SIMATIC ET200ecoPN: IO-Link Master | Lien |
| SIMATIC ET200M IM153-4 PN IO HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200M IM153-4 PN IO ST (incl. SIPLUS variants) | Lien |
| SIMATIC ET200M (incl. SIPLUS variants) | Lien |
| SIMATIC ET200M (incl. SIPLUS variants) | Lien |
| SIMATIC ET200M (incl. SIPLUS variants) | Lien |
| SIMATIC ET200M (incl. SIPLUS variants) | Lien |
| SIMATIC ET200MP IM155-5 PN BA (incl. SIPLUS variants) | Lien |
| SIMATIC ET200MP IM155-5 PN BA (incl. SIPLUS variants) | Lien |
| SIMATIC ET200MP IM155-5 PN BA (incl. SIPLUS variants) | Lien |
| SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants) | Lien |
| SIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants) | Lien |
| SIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants) | Lien |
| SIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants) | Lien |
| SIMATIC ET200pro IM 154-3 PN HF | Lien |
| SIMATIC ET200pro IM 154-4 PN HF | Lien |
| SIMATIC ET200pro | Lien |
| SIMATIC ET200pro | Lien |
| SIMATIC ET200pro | Lien |
| SIMATIC ET200pro | Lien |
| SIMATIC ET200S (incl. SIPLUS variants) | Lien |
| SIMATIC ET200S (incl. SIPLUS variants) | Lien |
| SIMATIC ET200S (incl. SIPLUS variants) | Lien |
| SIMATIC ET200S (incl. SIPLUS variants) | Lien |
| SIMATIC ET200S (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 MF HF | Lien |
| SIMATIC ET200SP IM155-6 PN/2 HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN/2 HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN/3 HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN/3 HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN BA (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN BA (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN Basic (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN HS (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN HS (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN HS (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP (incl. SIPLUS variants except IM155-6 PN ST and IM155-6 PN HF) | Lien |
| SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) | Lien |
| SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) | Lien |
| SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) | Lien |
| SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) | Lien |
| SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) | Lien |
| SIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants) | Lien |
| SIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants) | Lien |
| SIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants) | Lien |
| SIMATIC Field PG M5 | Lien |
| SIMATIC Field PG M6 | Lien |
| SIMATIC HMI Comfort Outdoor Panels 7\ & 15\ (incl. SIPLUS variants) | Lien |
| SIMATIC HMI Comfort Outdoor Panels 7\ & 15\ (incl. SIPLUS variants) | Lien |
| SIMATIC HMI Comfort Outdoor Panels 7\ & 15\ (incl. SIPLUS variants) | Lien |
| SIMATIC HMI Comfort Outdoor Panels 7\ & 15\ (incl. SIPLUS variants) | Lien |
| SIMATIC HMI Comfort Panels 4\ - 22\ (incl. SIPLUS variants) | Lien |
| SIMATIC HMI Comfort Panels 4\ - 22\ (incl. SIPLUS variants) | Lien |
| SIMATIC HMI Comfort Panels 4\ - 22\ (incl. SIPLUS variants) | Lien |
| SIMATIC HMI Comfort Panels 4\ - 22\ (incl. SIPLUS variants) | Lien |
| SIMATIC HMI Comfort Panels HMI Multi Panels HMI Mobile Panels (incl. SIPLUS variants) | Lien |
| SIMATIC HMI KTP Mobile Panels KTP400F KTP700 KTP700F KTP900 and KTP900F | Lien |
| SIMATIC HMI KTP Mobile Panels KTP400F KTP700 KTP700F KTP900 and KTP900F | Lien |
| SIMATIC HMI KTP Mobile Panels | Lien |
| SIMATIC HMI KTP Mobile Panels | Lien |
| SIMATIC IE/PB-LINK V3 | Lien |
| SIMATIC Information Server | Lien |
| SIMATIC IPC1047E | Lien |
| SIMATIC IPC1047 | Lien |
| SIMATIC IPC127E | Lien |
| SIMATIC IPC427E | Lien |
| SIMATIC IPC477E Pro | Lien |
| SIMATIC IPC477E | Lien |
| SIMATIC IPC527G | Lien |
| SIMATIC IPC547G | Lien |
| SIMATIC IPC627E | Lien |
| SIMATIC IPC647D | Lien |
| SIMATIC IPC647E | Lien |
| SIMATIC IPC647E | Lien |
| SIMATIC IPC677E | Lien |
| SIMATIC IPC847D | Lien |
| SIMATIC IPC847E | Lien |
| SIMATIC IPC847E | Lien |
| SIMATIC IPC DiagMonitor | Lien |
| SIMATIC IPC DiagMonitor | Lien |
| SIMATIC IPC Support Package for VxWorks | Lien |
| SIMATIC ITC1500 PRO | Lien |
| SIMATIC ITC1500 | Lien |
| SIMATIC ITC1900 PRO | Lien |
| SIMATIC ITC1900 | Lien |
| SIMATIC ITC2200 PRO | Lien |
| SIMATIC ITC2200 | Lien |
| SIMATIC ITP1000 | Lien |
| SIMATIC Logon | Lien |
| SIMATIC MICRO-DRIVE PDC | Lien |
| SIMATIC MV400 family | Lien |
| SIMATIC MV400 | Lien |
| SIMATIC MV540 H (6GF3540-0GE10) | Lien |
| SIMATIC MV540 H | Lien |
| SIMATIC MV540 H | Lien |
| SIMATIC MV540 S (6GF3540-0CD10) | Lien |
| SIMATIC MV540 S | Lien |
| SIMATIC MV540 S | Lien |
| SIMATIC MV550 H (6GF3550-0GE10) | Lien |
| SIMATIC MV550 H | Lien |
| SIMATIC MV550 H | Lien |
| SIMATIC MV550 S (6GF3550-0CD10) | Lien |
| SIMATIC MV550 S | Lien |
| SIMATIC MV550 S | Lien |
| SIMATIC MV560 U (6GF3560-0LE10) | Lien |
| SIMATIC MV560 U | Lien |
| SIMATIC MV560 U | Lien |
| SIMATIC MV560 X (6GF3560-0HE10) | Lien |
| SIMATIC MV560 X | Lien |
| SIMATIC MV560 X | Lien |
| SIMATIC NET CP 1604 | Lien |
| SIMATIC NET CP 1616 | Lien |
| SIMATIC NET DK-16xx PN IO | Lien |
| SIMATIC NET PC Software | Lien |
| SIMATIC PCS 7 TeleControl | Lien |
| SIMATIC PCS 7 V8.2 and earlier | Lien |
| SIMATIC PCS 7 V8.2 and earlier | Lien |
| SIMATIC PCS 7 V9.0 | Lien |
| SIMATIC PCS 7 V9.0 | Lien |
| SIMATIC PCS 7 V9.1 | Lien |
| SIMATIC PCS 7 V9.1 | Lien |
| SIMATIC PCS neo | Lien |
| SIMATIC PCS neo | Lien |
| SIMATIC PCS neo | Lien |
| SIMATIC PDM | Lien |
| SIMATIC PN/PN Coupler 6ES7158-3AD01-0XA0 (incl. SIPLUS NET variant) | Lien |
| SIMATIC PN/PN Coupler 6ES7158-3AD01-0XA0 (incl. SIPLUS NET variant) | Lien |
| SIMATIC PN/PN Coupler (incl. SIPLUS NET variants) | Lien |
| SIMATIC PN/PN Coupler (incl. SIPLUS NET variants) | Lien |
| SIMATIC PN/PN Coupler (incl. SIPLUS NET variants) | Lien |
| SIMATIC PN/PN Coupler (incl. SIPLUS NET variants) | Lien |
| SIMATIC Power Line Booster PLB Base Module | Lien |
| SIMATIC Process Historian (incl. Process Historian OPC UA Server) | Lien |
| SIMATIC Process Historian OPC UA Server | Lien |
| SIMATIC Process Historian OPC UA Server | Lien |
| SIMATIC PROFINET Driver | Lien |
| SIMATIC PROFINET Driver | Lien |
| SIMATIC RF166C | Lien |
| SIMATIC RF180C | Lien |
| SIMATIC RF180C | Lien |
| SIMATIC RF182C | Lien |
| SIMATIC RF182C | Lien |
| SIMATIC RF182C | Lien |
| SIMATIC RF185C | Lien |
| SIMATIC RF185C | Lien |
| SIMATIC RF185C | Lien |
| SIMATIC RF186CI | Lien |
| SIMATIC RF186CI | Lien |
| SIMATIC RF186C | Lien |
| SIMATIC RF186C | Lien |
| SIMATIC RF186C | Lien |
| SIMATIC RF188CI | Lien |
| SIMATIC RF188CI | Lien |
| SIMATIC RF188C | Lien |
| SIMATIC RF188C | Lien |
| SIMATIC RF188C | Lien |
| SIMATIC RF188C | Lien |
| SIMATIC RF360R | Lien |
| SIMATIC RF600 family | Lien |
| SIMATIC RF600R | Lien |
| SIMATIC RF600R | Lien |
| SIMATIC RF600 | Lien |
| SIMATIC RF650R | Lien |
| SIMATIC RF680R | Lien |
| SIMATIC RF685R | Lien |
| SIMATIC RTU3010C | Lien |
| SIMATIC RTU3030C | Lien |
| SIMATIC RTU3031C | Lien |
| SIMATIC RTU3041C | Lien |
| SIMATIC S7-1200 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-1200 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-1200 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-1200 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-1200 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-1200 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-1200 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (MLFB: 6ES7518-4AX00-1AC0 6AG1518-4AX00-4AC0 incl. SIPLUS variant) | Lien |
| SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (MLFB: 6ES7518-4AX00-1AC0 6AG1518-4AX00-4AC0 incl. SIPLUS variant) | Lien |
| SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (MLFB: 6ES7518-4AX00-1AC0 6AG1518-4AX00-4AC0 incl. SIPLUS variant) | Lien |
| SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP | Lien |
| SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP | Lien |
| SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-1500 Software Controller (incl. F) | Lien |
| SIMATIC S7-1500 Software Controller | Lien |
| SIMATIC S7-1500 Software Controller | Lien |
| SIMATIC S7-1500 Software Controller | Lien |
| SIMATIC S7-1500 Software Controller | Lien |
| SIMATIC S7-1500 Software Controller | Lien |
| SIMATIC S7-1500 Software Controller | Lien |
| SIMATIC S7-200 SMART | Lien |
| SIMATIC S7-200 SMART | Lien |
| SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-400 H V6 CPU family and below (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 H V6 CPU family and below (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 PN/DP V6 CPU family and below (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 PN/DP V6 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 PN/DP V7 and below CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-410 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-410 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-PLCSIM Advanced | Lien |
| SIMATIC S7-PLCSIM Advanced | Lien |
| SIMATIC TDC CP51M1 | Lien |
| SIMATIC TDC CP51M1 | Lien |
| SIMATIC TDC CP51M1 | Lien |
| SIMATIC TDC CP51M1 | Lien |
| SIMATIC TDC CPU555 | Lien |
| SIMATIC TDC CPU555 | Lien |
| SIMATIC TDC CPU555 | Lien |
| SIMATIC TDC CPU555 | Lien |
| SIMATIC Teleservice Adapter IE Advanced | Lien |
| SIMATIC Teleservice Adapter IE Advanced | Lien |
| SIMATIC Teleservice Adapter IE Advanced | Lien |
| SIMATIC Teleservice Adapter IE Basic | Lien |
| SIMATIC Teleservice Adapter IE Basic | Lien |
| SIMATIC Teleservice Adapter IE Basic | Lien |
| SIMATIC Teleservice Adapter IE Standard | Lien |
| SIMATIC Teleservice Adapter IE Standard | Lien |
| SIMATIC WinAC RTX (F) 2010 | Lien |
| SIMATIC WinAC RTX (F) 2010 | Lien |
| SIMATIC WinAC RTX (F) 2010 | Lien |
| SIMATIC WinAC RTX (F) 2010 | Lien |
| SIMATIC WinAC RTX (F) 2010 | Lien |
| SIMATIC WinAC RTX (F) 2010 | Lien |
| SIMATIC WinCC OA | Lien |
| SIMATIC WinCC OA V3.17 | Lien |
| SIMATIC WinCC OA V3.18 | Lien |
| SIMATIC WinCC Runtime Advanced | Lien |
| SIMATIC WinCC Runtime Advanced | Lien |
| SIMATIC WinCC Runtime Advanced | Lien |
| SIMATIC WinCC TeleControl | Lien |
| SIMATIC WinCC V15 and earlier | Lien |
| SIMATIC WinCC V15 and earlier | Lien |
| SIMATIC WinCC V16 | Lien |
| SIMATIC WinCC V16 | Lien |
| SIMATIC WinCC V17 | Lien |
| SIMATIC WinCC V17 | Lien |
| SIMATIC WinCC V7.4 and earlier | Lien |
| SIMATIC WinCC V7.4 and earlier | Lien |
| SIMATIC WinCC V7.5 | Lien |
| SIMATIC WinCC V7.5 | Lien |
| Simcenter 3D | Lien |
| Simcenter Amesim | Lien |
| Simcenter Femap V2020.2 | Lien |
| Simcenter Femap V2021.1 | Lien |
| Simcenter System Architect | Lien |
| Simcenter System Simulation Client for Git | Lien |
| Simcenter Testlab Data Management | Lien |
| Simcenter Testlab | Lien |
| SIMIT Simulation Platform | Lien |
| SIMOCODE pro V EIP (incl. SIPLUS variants) | Lien |
| SIMOCODE proV Ethernet/IP | Lien |
| SIMOCODE pro V PN (incl. SIPLUS variants) | Lien |
| SIMOCODE pro V PN (incl. SIPLUS variants) | Lien |
| SIMOCODE pro V PN (incl. SIPLUS variants) | Lien |
| SIMOCODE proV PROFINET | Lien |
| SIMOTION C | Lien |
| SIMOTION C | Lien |
| SIMOTION D (incl. SIPLUS variants) | Lien |
| SIMOTION D (incl. SIPLUS variants) | Lien |
| SIMOTION (incl. SIPLUS variants) | Lien |
| SIMOTION (incl. SIPLUS variants) | Lien |
| SIMOTION P | Lien |
| SIMOTION P V4.4 and V4.5 | Lien |
| SIMOTION P V5 | Lien |
| SINAMICS Connect 300 | Lien |
| SINAMICS DCM | Lien |
| SINAMICS DCM | Lien |
| SINAMICS DCM w. PN | Lien |
| SINAMICS DCM w. PN | Lien |
| SINAMICS DCP | Lien |
| SINAMICS DCP | Lien |
| SINAMICS DCP | Lien |
| SINAMICS DCP w. PN | Lien |
| SINAMICS DCP w. PN | Lien |
| SINAMICS G110M V4.7 Control Unit | Lien |
| SINAMICS G110M V4.7 PN Control Unit | Lien |
| SINAMICS G110M w. PN | Lien |
| SINAMICS G110M w. PN | Lien |
| SINAMICS G120(C/P/D) w. PN (incl. SIPLUS variants) | Lien |
| SINAMICS G120(C/P/D) w. PN (incl. SIPLUS variants) | Lien |
| SINAMICS G120 V4.7 Control Unit (incl. SIPLUS variants) | Lien |
| SINAMICS G120 V4.7 PN Control Unit (incl. SIPLUS variants) | Lien |
| SINAMICS G130 V4.6 Control Unit | Lien |
| SINAMICS G130 V4.7 Control Unit | Lien |
| SINAMICS G130 V4.7 Control Unit | Lien |
| SINAMICS G130 V4.7 Control Unit | Lien |
| SINAMICS G130 V4.7 SP1 Control Unit | Lien |
| SINAMICS G130 V4.7 w. PN | Lien |
| SINAMICS G130 V4.7 w. PN | Lien |
| SINAMICS G130 V4.8 Control Unit | Lien |
| SINAMICS G130 V4.8 w. PN | Lien |
| SINAMICS G130 V4.8 w. PN | Lien |
| SINAMICS G130 V5.1 Control Unit | Lien |
| SINAMICS G130 V5.1 SP1 Control Unit | Lien |
| SINAMICS G150 Control Unit | Lien |
| SINAMICS G150 Control Unit | Lien |
| SINAMICS G150 V4.6 Control Unit | Lien |
| SINAMICS G150 V4.7 Control Unit | Lien |
| SINAMICS G150 V4.7 SP1 Control Unit | Lien |
| SINAMICS G150 V4.7 w. PN | Lien |
| SINAMICS G150 V4.7 w. PN | Lien |
| SINAMICS G150 V4.8 Control Unit | Lien |
| SINAMICS G150 V4.8 w. PN | Lien |
| SINAMICS G150 V4.8 w. PN | Lien |
| SINAMICS G150 V5.1 Control Unit | Lien |
| SINAMICS G150 V5.1 SP1 Control Unit | Lien |
| SINAMICS GH150 V4.7 Control Unit | Lien |
| SINAMICS GH150 V4.7 Control Unit | Lien |
| SINAMICS GL150 V4.7 Control Unit | Lien |
| SINAMICS GL150 V4.7 Control Unit | Lien |
| SINAMICS GM150 V4.7 Control Unit | Lien |
| SINAMICS GM150 V4.7 Control Unit | Lien |
| SINAMICS S110 Control Unit | Lien |
| SINAMICS S110 Control Unit | Lien |
| SINAMICS S110 w. PN | Lien |
| SINAMICS S110 w. PN | Lien |
| SINAMICS S120 prior to V4.7 w. PN (incl. SIPLUS variants) | Lien |
| SINAMICS S120 prior to V4.7 w. PN (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V4.6 Control Unit (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V4.7 Control Unit and CBE20 (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V4.7 Control Unit (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V4.7 Control Unit (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V4.7 SP1 Control Unit (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V4.7 SP1 w. PN (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V4.7 SP1 w. PN (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V4.7 w. PN (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V4.7 w. PN (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V4.8 Control Unit (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V4.8 w. PN (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V4.8 w. PN (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V5.1 Control Unit (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V5.1 SP1 Control Unit (incl. SIPLUS variants) | Lien |
| SINAMICS S150 Control Unit | Lien |
| SINAMICS S150 Control Unit | Lien |
| SINAMICS S150 V4.6 Control Unit | Lien |
| SINAMICS S150 V4.7 Control Unit | Lien |
| SINAMICS S150 V4.7 SP1 Control Unit | Lien |
| SINAMICS S150 V4.7 w. PN | Lien |
| SINAMICS S150 V4.7 w. PN | Lien |
| SINAMICS S150 V4.8 Control Unit | Lien |
| SINAMICS S150 V4.8 w. PN | Lien |
| SINAMICS S150 V4.8 w. PN | Lien |
| SINAMICS S150 V5.1 Control Unit | Lien |
| SINAMICS S150 V5.1 SP1 Control Unit | Lien |
| SINAMICS S210 V5.1 Control Unit | Lien |
| SINAMICS S210 V5.1 SP1 Control Unit | Lien |
| SINAMICS S/G Control Unit w. PROFINET | Lien |
| SINAMICS SL150 V4.7 Control Unit | Lien |
| SINAMICS SL150 V4.7 Control Unit | Lien |
| SINAMICS SM120 V4.7 Control Unit | Lien |
| SINAMICS SM120 V4.7 Control Unit | Lien |
| SINAMICS V90 w. PN | Lien |
| SINAMICS V90 w. PN | Lien |
| SINEC INS | Lien |
| SINEC NMS | Lien |
| SINEC-NMS | Lien |
| SINEC NMS | Lien |
| SINEMA Remote Connect Server | Lien |
| SINEMA Remote Connect Server | Lien |
| SINEMA Remote Connect Server | Lien |
| SINEMA Remote Connect Server | Lien |
| SINEMA Remote Connect Server | Lien |
| SINEMA Server | Lien |
| SINEMA Server | Lien |
| SINEMA Server V14 | Lien |
| SINUMERIK 808D | Lien |
| SINUMERIK 828D HW PU.4 | Lien |
| SINUMERIK 828D | Lien |
| SINUMERIK 828D | Lien |
| SINUMERIK 828D | Lien |
| SINUMERIK 828D V4.5 and prior | Lien |
| SINUMERIK 828D V4.7 | Lien |
| SINUMERIK 840D sl | Lien |
| SINUMERIK 840D sl | Lien |
| SINUMERIK 840D sl | Lien |
| SINUMERIK 840D sl | Lien |
| SINUMERIK 840D sl V4.5 and prior | Lien |
| SINUMERIK 840D sl V4.7 | Lien |
| SINUMERIK MC MCU 1720 | Lien |
| SINUMERIK ONE NCU 1740 | Lien |
| SINUMERIK ONE PPU 1740 | Lien |
| SINUMERIK ONE / SINUMERIK 840D sl Handheld Terminal HT 10 | Lien |
| SINUMERIK OPC UA Server | Lien |
| SINUMERIK OPC UA Server | Lien |
| SINUMERIK Operate | Lien |
| SiPass integrated V2.80 | Lien |
| SiPass integrated V2.85 | Lien |
| SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL | Lien |
| SIPLUS ET 200SP CP 1543SP-1 ISEC | Lien |
| SIPLUS ET 200SP CP 1543SP-1 ISEC | Lien |
| SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL | Lien |
| SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL | Lien |
| SIPLUS NET CP 1543-1 | Lien |
| SIPLUS NET CP 1543-1 | Lien |
| SIPLUS NET CP 1543-1 | Lien |
| SIPLUS NET CP 1543-1 | Lien |
| SIPLUS NET CP 343-1 Advanced | Lien |
| SIPLUS NET CP 343-1 Advanced | Lien |
| SIPLUS NET CP 343-1 Advanced | Lien |
| SIPLUS NET CP 343-1 Lean | Lien |
| SIPLUS NET CP 343-1 | Lien |
| SIPLUS NET CP 443-1 Advanced | Lien |
| SIPLUS NET CP 443-1 Advanced | Lien |
| SIPLUS NET CP 443-1 Advanced | Lien |
| SIPLUS NET CP 443-1 | Lien |
| SIPLUS NET CP 443-1 | Lien |
| SIPLUS NET CP 443-1 | Lien |
| SIPLUS S7-1200 CP 1243-1 RAIL | Lien |
| SIPLUS S7-1200 CP 1243-1 RAIL | Lien |
| SIPLUS S7-1200 CP 1243-1 RAIL | Lien |
| SIPLUS S7-1200 CP 1243-1 | Lien |
| SIPLUS S7-1200 CP 1243-1 | Lien |
| SIPLUS S7-1200 CP 1243-1 | Lien |
| SIPLUS TIM 1531 IRC | Lien |
| SIPLUS TIM 1531 IRC | Lien |
| SIRIUS ACT 3SU1 interface module PROFINET | Lien |
| SIRIUS Motor Starter M200D PROFINET | Lien |
| SIRIUS Soft Starter 3RW44 PN | Lien |
| SIRIUS Soft Starter 3RW44 PN | Lien |
| SITOP Manager | Lien |
| SITOP PSU8600 PROFINET | Lien |
| SITOP PSU8600 | Lien |
| SITOP UPS1600 (incl. SIPLUS variants) | Lien |
| SITOP UPS1600 PROFINET (incl. SIPLUS variants) | Lien |
| Siveillance Command | Lien |
| Siveillance Control Pro | Lien |
| Siveillance Identity V1.5 | Lien |
| Siveillance Identity V1.6 | Lien |
| Siveillance Vantage | Lien |
| SOFTNET-IE PNIO | Lien |
| SOFTNET-IE PNIO | Lien |
| Softnet PROFINET IO for PC-based Windows systems | Lien |
| Solid Edge CAM Pro | Lien |
| Solid Edge Harness Design | Lien |
| Solid Edge SE2021 | Lien |
| Solid Edge SE2022 | Lien |
| Spectrum Power 4 | Lien |
| Spectrum Power 4 | Lien |
| Spectrum Power 7 | Lien |
| SPPA-T3000 SeS3000 Security Server (6DU7054-0..00-..A0) | Lien |
| Teamcenter Active Workspace | Lien |
| Teamcenter Briefcase Browser | Lien |
| Teamcenter Data Share Manager | Lien |
| Teamcenter Deployment Center | Lien |
| Teamcenter Dispatcher Service | Lien |
| Teamcenter EDA | Lien |
| Teamcenter FMS | Lien |
| Teamcenter Integration for CATIA | Lien |
| Teamcenter Integration Framework | Lien |
| Teamcenter MBSE Gateway | Lien |
| Teamcenter Mendix Connector | Lien |
| Teamcenter Microservices Framework | Lien |
| Teamcenter Polarion Integration | Lien |
| Teamcenter Rapid Start | Lien |
| Teamcenter Reporting and Analytics V11 | Lien |
| Teamcenter Reporting and Analytics V12.2 | Lien |
| Teamcenter Reporting and Analytics V12.3 | Lien |
| Teamcenter Reporting and Analytics V12.4 | Lien |
| Teamcenter Reporting and Analytics V13 | Lien |
| Teamcenter Retail Footwear and Apparel | Lien |
| Teamcenter Security Services | Lien |
| Teamcenter Supplier Collaboration | Lien |
| Teamcenter System Modeling Workbench | Lien |
| Teamcenter | Lien |
| Teamcenter Technical Publishing | Lien |
| Teamcenter Visualization V12.4 | Lien |
| Teamcenter Visualization V13.1 | Lien |
| Teamcenter Visualization V13.2 | Lien |
| Teamcenter Visualization V13.3 | Lien |
| Tecnomatix eBOP Manager Server | Lien |
| Tecnomatix Intosite | Lien |
| Tecnomatix Plant Simulation | Lien |
| Tecnomatix Process Designer | Lien |
| Tecnomatix Process Simulate | Lien |
| Tecnomatix Process Simulate VCLite | Lien |
| Tecnomatix RobotExpert | Lien |
| TeleControl Server Basic | Lien |
| TIA Administrator | Lien |
| TIA Administrator | Lien |
| TIM 1531 IRC (incl. SIPLUS NET variants) | Lien |
| TIM 1531 IRC (incl. SIPLUS NET variants) | Lien |
| TIM 1531 IRC (incl. SIPLUS NET variants) | Lien |
| TIM 1531 IRC | Lien |
| TIM 1531 IRC | Lien |
| TIM 3V-IE Advanced (incl. SIPLUS NET variants) | Lien |
| TIM 3V-IE DNP3 (incl. SIPLUS NET variants) | Lien |
| TIM 3V-IE (incl. SIPLUS NET variants) | Lien |
| TIM 4R-IE DNP3 (incl. SIPLUS NET variants) | Lien |
| TIM 4R-IE (incl. SIPLUS NET variants) | Lien |
| Valor Parts Library - VPL Direct | Lien |
| Valor Parts Library - VPL Server or Service | Lien |
| VeSys | Lien |
| Xpedition Enterprise VX.2.10 | Lien |
| Xpedition Enterprise VX.2.6 | Lien |
| Xpedition Enterprise VX.2.7 | Lien |
| Xpedition Enterprise VX.2.8 | Lien |
| Xpedition Enterprise (XCR) VX.2.10 | Lien |
| Xpedition IC Packaging VX.2.10 | Lien |
| Xpedition IC Packaging VX.2.6 | Lien |
| Xpedition IC Packaging VX.2.7 | Lien |
| Xpedition IC Packaging VX.2.8 | Lien |
| Xpedition IC Packaging (XCR) VX.2.10 | Lien |
| Vendor | Product | Description |
|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003ctable\u003e \u003cthead\u003e \u003ctr\u003e \u003cth\u003eSyst\u00e8me affect\u00e9\u003c/th\u003e \u003cth\u003eLien vers l\u0027avis \u00e9diteur\u003c/th\u003e \u003c/tr\u003e \u003c/thead\u003e \u003ctbody\u003e \u003ctr\u003e \u003ctd\u003eAdvantage Navigator Energy \u0026amp; Sustainability\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eAdvantage Navigator Software Proxy V6\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eBuilding Operator Discovery Distribution for the Connect X200 Gateway\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eBuilding Operator Discovery Distribution for the Connect X300 Gateway\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eBuilding Twin - 360\u00b0 Viewer\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eCapital\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eCerberus DMS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eCloudConnect 712\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eCOMOS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eCOMOS V10.2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-995338.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eCOMOS V10.3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-995338.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eCOMOS V10.4\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-995338.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003ecRSP Operator Client Starter\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003ecRSP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDesigo CC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200P\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200P\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200P\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200P\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200P\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200P\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200P\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eE-Car OC Cloud Application\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eEnergy Engage\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eEnergyIP Prepay V3.7\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eEnergyIP Prepay V3.8\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eEnergyIP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eEnlighted Amaze\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eEnlighted Where\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eGeolus Shape Search V10\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eGeolus Shape Search V11\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eGMA-Manager\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eHEEDS Connect\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eHES UDIS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eIE/AS-i Link PN IO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eIE/PB-Link (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eIE/PB LINK PN IO (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eIndustrial Edge Hub\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eIndustrial Edge Management App (IEM-App)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eIndustrial Edge Management OS (IEM-OS)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003ejROS for Spectrum Power 4\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003ejROS for Spectrum Power 7\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eJT2Go\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-301589.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eKTK ATE530S\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eLOGO! CMR2020\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-316383.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eLOGO! CMR2040\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-316383.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMendix Applications\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindSphere App Management Cockpits (Developer\u0026amp; Operator)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindSphere Asset Manager\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindsphere Cloud Foundry\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindsphere Cloud Platform\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindSphere IAM (User Management/ Settings)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindSphere Integrated Data Lake\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindSphere Notification Service\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindSphere Predictive Learning\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindSphere Usage Transparency Service\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindSphere Visual Explorer\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eNXpower Monitor\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eNX\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eOpcenter EX CP Process Automation Control\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eOpcenter Execution Core Process Automation Control\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eOpcenter Intelligence\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eOperation Scheduler\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003ePROFINET Driver for Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003ePSS(R)CAPE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRFID 181EIP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eROX II\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM APE1404 Linux\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM CROSSBOW Station Access Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RCM1224\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RM1224 LTE(4G) EU\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RM1224 LTE(4G) EU\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RM1224 LTE(4G) NAM\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RM1224 LTE(4G) NAM\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RM1224\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RM1224\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RM1224\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX MX5000RE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX MX5000\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX1400\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX1500\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX1501\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX1510\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX1511\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX1512\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX1524\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX1536\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX5000\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RX1400 VPE Debian Linux\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RX1400 VPE Linux CloudConnect\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE LPE9403\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M-800 / S615\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M-800\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M804PB\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M804PB\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M804PB\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M804PB\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M804PB\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router (Annex A)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router (Annex A)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router (Annex A)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router (Annex A)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router (Annex B)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router (Annex B)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router (Annex B)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router (Annex B)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router (Annex A)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router (Annex A)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router (Annex A)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router (Annex A)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router (Annex B)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router (Annex B)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router (Annex B)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router (Annex B)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M826-2 SHDSL-Router\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M826-2 SHDSL-Router\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M826-2 SHDSL-Router\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M826-2 SHDSL-Router\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M826-2 SHDSL-Router\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M875\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3 (ROK)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3 (ROK)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3 (ROK)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3 (ROK)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3 (ROK)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (EU)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (EU)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (EU)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (EU)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (EU)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (NAM)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (NAM)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (NAM)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (NAM)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (NAM)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE MUM856-1 (EU)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE MUM856-1 (EU)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE MUM856-1 (RoW)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE MUM856-1 (RoW)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S602\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S602\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S602\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S612\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S612\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S612\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S615\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S615\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S615\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S615\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S615\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S623\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S623\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S623\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S627-2M\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S627-2M\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S627-2M\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC622-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC622-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC622-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC622-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC632-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC632-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC632-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC632-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC636-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC636-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC636-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC636-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC642-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC642-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC642-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC642-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC646-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC646-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC646-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC646-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W-1700 IEEE 802.11ac family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W-1700 IEEE 802.11ac family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W-1700 IEEE 802.11ac family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1748-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1748-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1750D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1750D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1788-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1788-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1788-2 EEC M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1788-2 EEC M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1788-2IA M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1788-2IA M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1788-2 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1788-2 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W-700 IEEE 802.11n family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W-700 IEEE 802.11n family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W-700 IEEE 802.11n family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W-700 IEEE 802.11n family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W700\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W721-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W721-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W722-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W722-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W734-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W734-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W734-1 RJ45 (USA)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W734-1 RJ45 (USA)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W738-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W738-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W748-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W748-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W748-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W748-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W761-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W761-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W774-1 M12 EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W774-1 M12 EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W774-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W774-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W774-1 RJ45 (USA)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W774-1 RJ45 (USA)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W778-1 M12 EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W778-1 M12 EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W778-1 M12 EEC (USA)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W778-1 M12 EEC (USA)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W778-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W778-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W786-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W786-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W786-2IA RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W786-2IA RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W786-2 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W786-2 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W786-2 SFP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W786-2 SFP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-2 M12 EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-2 M12 EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-2 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-2 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-2 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-2 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM763-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM766-1 6GHz\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM766-1 6GHz\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM766-1 EEC 6GHz\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM766-1 EEC 6GHz\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM766-1 EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM766-1 EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM766-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM766-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WLC711\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WLC712\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WUM763-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WUM766-1 6GHz\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WUM766-1 6GHz\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WUM766-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WUM766-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X200-4 P IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X200-4 P IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200IRT (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200IRT switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-100232.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200IRT switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200IRT switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200IRT switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200 switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-100232.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200 switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200 switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200 switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X201-3P IRT PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X201-3P IRT PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X201-3P IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X201-3P IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X202-2 IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X202-2 IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X202-2P IRT (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X202-2P IRT (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X202-2P IRT PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X202-2P IRT PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2FM\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2FM\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2 (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2LD (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2LD\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2LD TS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2LD TS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2TS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2TS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204 IRT PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204 IRT PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204 IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204 IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA EEC (HSR)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-100232.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA EEC (HSR)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-443566.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA EEC (PRP/HSR)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-100232.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA EEC (PRP/HSR)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-443566.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA EEC (PRP)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-100232.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA EEC (PRP)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-443566.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA (HSR)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-100232.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA (HSR)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-443566.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA (PRP)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-100232.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA (PRP)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-443566.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X206-1LD (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X206-1LD\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X206-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X206-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X208 (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X208PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X208PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X208\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X212-2LD\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X212-2LD\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X212-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X212-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X216\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X216\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X224\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X224\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-300 (incl. X408 and SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-300 switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-443566.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7 EEC (230V coated)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7 EEC (230V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7 EEC (24V coated)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7 EEC (24V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7 EEC (2x 230V coated)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7 EEC (2x 230V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7 EEC (2x 24V coated)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7 EEC (2x 24V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X304-2FE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X304-2FE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X306-1LD FE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X306-1LDFE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2 EEC (230V coated)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2 EEC (230V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2 EEC (24V coated)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2 EEC (24V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2 EEC (2x 230V coated)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2 EEC (2x 230V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2 EEC (2x 24V coated)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2 EEC (2x 24V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-3LD\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-3LD\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2 (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2LD\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2LD\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2LH+\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2LH\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2LH+\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2LH\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2M PoE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2M PoE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2M\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2M\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2M TS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2M TS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X310FE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X310FE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X310\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X310\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X320-1-2LD FE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X320-1 FE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X320-1FE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X320-3LDFE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X408-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X408\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X414\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XB-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XB-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XB-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XC-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XC-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XC-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF-200BA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF-200BA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF-200BA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF201-3P IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF201-3P IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF202-2P IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF202-2P IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF204-2BA IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF204-2BA IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF204-2 (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF204-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF204 IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF204 IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF204\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF204\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF206-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF206-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF208\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF208\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XM-400 Family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XM400\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XM-400\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XM-400\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XP-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XP-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XP-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR-300WG\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR-300WG\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR-300WG\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-12M (230V ports on front)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-12M (230V ports on rear)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-12M (24V ports on front)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-12M (24V ports on rear)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-12M\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-12M TS (24V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-12M TS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M EEC (100-240VAC/60-250VDC ports on front)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M EEC (100-240VAC/60-250VDC ports on rear)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M EEC (24V ports on front)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M EEC (24V ports on rear)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC ports on front)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC ports on rear)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M PoE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M PoE TS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR-500 Family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR-500 Family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR500\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR-500\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON 3VA COM100/800\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON 3VA DSP800\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON PAC2200 (with CLP Approval)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON PAC2200 (with MID Approval)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON PAC2200 (without MID Approval)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON PAC3200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON PAC3200T\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON PAC3220\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON PAC4200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON powermanager V4\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSICAM 230\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSICAM TOOLBOX II\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-669737.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIDOOR ATD430W\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIDOOR ATE530S COATED\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIDOOR ATE531S\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIGUARD DSA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CFU PA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CFU PA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Cloud Connect 7 CC712\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Cloud Connect 7 CC716\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CM 1542-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CM 1542-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CM 1542-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CM 1542SP-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Compact Field Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1242-7C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1242-7 GPRS V2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1242-7 GPRS V2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1242-7 GPRS V2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-1 DNP3 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-1 IEC (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-1 IRC (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-7 LTE EU\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-7 LTE EU\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-7 LTE EU\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-7 LTE EU\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-7 LTE US\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-7 LTE US\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-7 LTE US\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-7 LTE US\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-8 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-8 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-8 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-8 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1542SP-1 IRC (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1542SP-1 IRC (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1542SP-1 IRC (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1542SP-1 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1542SP-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1542SP-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1542SP-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543SP-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543SP-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543SP-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543SP-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1545-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1545-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1545-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1604\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1604\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1616 and CP 1604\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP1616/CP1604\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1616\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1616\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1623\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1623\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP1626\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1626\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1628\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1628\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 Advanced (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 Advanced (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 ERPC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 Lean (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 Lean\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 442-1 RNA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 442-1 RNA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 Advanced (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 Advanced (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 Advanced (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 OPC UA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-211752.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 OPC UA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 OPC UA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 OPC UA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 OPC UA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 OPC UA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 OPC UA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 RNA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 RNA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC DK-16xx PN IO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Drive Controller family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Drive Controller family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-838121.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200AL IM 157-1 PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200AL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200AL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200AL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 4AO U/I 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 4AO U/I 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 4AO U/I 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 4AO U/I 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 4AO U/I 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/05A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/05A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/05A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/05A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/05A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN: IO-Link Master\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN: IO-Link Master\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN: IO-Link Master\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN: IO-Link Master\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN: IO-Link Master\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200M IM153-4 PN IO HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200M IM153-4 PN IO ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200M (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200M (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200M (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200M (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN BA (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN BA (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN BA (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200pro IM 154-3 PN HF\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200pro IM 154-4 PN HF\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200pro\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200pro\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200pro\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200pro\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200S (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200S (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200S (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200S (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200S (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 MF HF\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN/2 HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN/2 HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN/3 HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN/3 HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN BA (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN BA (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN Basic (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HS (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HS (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HS (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP (incl. SIPLUS variants except IM155-6 PN ST and IM155-6 PN HF)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-838121.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Field PG M5\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Field PG M6\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Outdoor Panels 7\\ \u0026amp; 15\\ (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Outdoor Panels 7\\ \u0026amp; 15\\ (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Outdoor Panels 7\\ \u0026amp; 15\\ (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Outdoor Panels 7\\ \u0026amp; 15\\ (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Panels 4\\ - 22\\ (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Panels 4\\ - 22\\ (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Panels 4\\ - 22\\ (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Panels 4\\ - 22\\ (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Panels HMI Multi Panels HMI Mobile Panels (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI KTP Mobile Panels KTP400F KTP700 KTP700F KTP900 and KTP900F\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI KTP Mobile Panels KTP400F KTP700 KTP700F KTP900 and KTP900F\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI KTP Mobile Panels\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI KTP Mobile Panels\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IE/PB-LINK V3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Information Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC1047E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC1047\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC127E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC427E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC477E Pro\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC477E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC527G\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC547G\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC627E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC647D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC647E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC647E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC677E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC847D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC847E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC847E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC DiagMonitor\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC DiagMonitor\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC Support Package for VxWorks\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ITC1500 PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ITC1500\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ITC1900 PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ITC1900\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ITC2200 PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ITC2200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ITP1000\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Logon\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MICRO-DRIVE PDC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV400 family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV400\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV540 H (6GF3540-0GE10)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV540 H\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV540 H\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV540 S (6GF3540-0CD10)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV540 S\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV540 S\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV550 H (6GF3550-0GE10)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV550 H\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV550 H\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV550 S (6GF3550-0CD10)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV550 S\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV550 S\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV560 U (6GF3560-0LE10)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV560 U\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV560 U\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV560 X (6GF3560-0HE10)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV560 X\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV560 X\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC NET CP 1604\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC NET CP 1616\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC NET DK-16xx PN IO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC NET PC Software\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS 7 TeleControl\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS 7 V8.2 and earlier\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-840188.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS 7 V8.2 and earlier\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-914168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS 7 V9.0\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-840188.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS 7 V9.0\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-914168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS 7 V9.1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-840188.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS 7 V9.1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-914168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS neo\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS neo\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS neo\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PDM\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PN/PN Coupler 6ES7158-3AD01-0XA0 (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PN/PN Coupler 6ES7158-3AD01-0XA0 (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PN/PN Coupler (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PN/PN Coupler (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PN/PN Coupler (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PN/PN Coupler (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Power Line Booster PLB Base Module\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Process Historian (incl. Process Historian OPC UA Server)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Process Historian OPC UA Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Process Historian OPC UA Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PROFINET Driver\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PROFINET Driver\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF166C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF180C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF180C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF182C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF182C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF182C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF185C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF185C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF185C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF186CI\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF186CI\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF186C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF186C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF186C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF188CI\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF188CI\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF188C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF188C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF188C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF188C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF360R\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF600 family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF600R\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF600R\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF600\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF650R\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF680R\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF685R\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RTU3010C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-316383.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RTU3030C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-316383.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RTU3031C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-316383.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RTU3041C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-316383.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1200 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1200 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1200 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1200 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1200 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1200 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1200 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-838121.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU 1518-4 PN/DP MFP (MLFB: 6ES7518-4AX00-1AC0 6AG1518-4AX00-4AC0 incl. SIPLUS variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU 1518-4 PN/DP MFP (MLFB: 6ES7518-4AX00-1AC0 6AG1518-4AX00-4AC0 incl. SIPLUS variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU 1518-4 PN/DP MFP (MLFB: 6ES7518-4AX00-1AC0 6AG1518-4AX00-4AC0 incl. SIPLUS variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU 1518F-4 PN/DP MFP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU 1518F-4 PN/DP MFP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-838121.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 Software Controller (incl. F)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 Software Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 Software Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 Software Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 Software Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 Software Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 Software Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-838121.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-200 SMART\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-200 SMART\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 H V6 CPU family and below (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 H V6 CPU family and below (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V6 CPU family and below (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V6 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V7 and below CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-410 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-410 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-410 V8 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-410 V8 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-PLCSIM Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-PLCSIM Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-838121.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC TDC CP51M1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC TDC CP51M1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC TDC CP51M1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC TDC CP51M1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC TDC CPU555\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC TDC CPU555\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC TDC CPU555\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC TDC CPU555\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Teleservice Adapter IE Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Teleservice Adapter IE Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Teleservice Adapter IE Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Teleservice Adapter IE Basic\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Teleservice Adapter IE Basic\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Teleservice Adapter IE Basic\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Teleservice Adapter IE Standard\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Teleservice Adapter IE Standard\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinAC RTX (F) 2010\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinAC RTX (F) 2010\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinAC RTX (F) 2010\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinAC RTX (F) 2010\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinAC RTX (F) 2010\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinAC RTX (F) 2010\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC OA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC OA V3.17\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC OA V3.18\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC Runtime Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC Runtime Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC Runtime Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC TeleControl\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V15 and earlier\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-840188.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V15 and earlier\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-914168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V16\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-840188.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V16\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-914168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V17\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-840188.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V17\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-914168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V7.4 and earlier\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-840188.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V7.4 and earlier\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-914168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V7.5\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-840188.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V7.5\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-914168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSimcenter 3D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSimcenter Amesim\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSimcenter Femap V2020.2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-609880.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSimcenter Femap V2021.1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-609880.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSimcenter System Architect\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSimcenter System Simulation Client for Git\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSimcenter Testlab Data Management\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSimcenter Testlab\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMIT Simulation Platform\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOCODE pro V EIP (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOCODE proV Ethernet/IP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOCODE pro V PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOCODE pro V PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOCODE pro V PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOCODE proV PROFINET\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION D (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION D (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION P\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION P V4.4 and V4.5\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION P V5\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS Connect 300\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCM\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCM\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCM w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCM w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCP w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCP w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G110M V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G110M V4.7 PN Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G110M w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G110M w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G120(C/P/D) w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G120(C/P/D) w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G120 V4.7 Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G120 V4.7 PN Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.6 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.7 SP1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.7 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.7 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.8 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.8 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.8 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V5.1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V5.1 SP1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V4.6 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V4.7 SP1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V4.7 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V4.7 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V4.8 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V4.8 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V4.8 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V5.1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V5.1 SP1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS GH150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS GH150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS GL150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS GL150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS GM150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS GM150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S110 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S110 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S110 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S110 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 prior to V4.7 w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 prior to V4.7 w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.6 Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.7 Control Unit and CBE20 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.7 Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.7 Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.7 SP1 Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.7 SP1 w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.7 SP1 w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.7 w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.7 w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.8 Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.8 w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.8 w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V5.1 Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V5.1 SP1 Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V4.6 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V4.7 SP1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V4.7 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V4.7 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V4.8 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V4.8 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V4.8 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V5.1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V5.1 SP1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S210 V5.1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S210 V5.1 SP1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S/G Control Unit w. PROFINET\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS SL150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS SL150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS SM120 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS SM120 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS V90 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS V90 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEC INS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEC NMS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEC-NMS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEC NMS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEMA Remote Connect Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEMA Remote Connect Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEMA Remote Connect Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEMA Remote Connect Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-654775.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEMA Remote Connect Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEMA Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEMA Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEMA Server V14\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 808D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 828D HW PU.4\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 828D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 828D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 828D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 828D V4.5 and prior\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 828D V4.7\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 840D sl\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 840D sl\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 840D sl\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 840D sl\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 840D sl V4.5 and prior\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 840D sl V4.7\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK MC MCU 1720\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK ONE NCU 1740\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK ONE PPU 1740\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK ONE / SINUMERIK 840D sl Handheld Terminal HT 10\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK OPC UA Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK OPC UA Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK Operate\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSiPass integrated V2.80\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSiPass integrated V2.85\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS ET 200SP CP 1543SP-1 ISEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS ET 200SP CP 1543SP-1 ISEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 1543-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 1543-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 1543-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 1543-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 343-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 343-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 343-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 343-1 Lean\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 343-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 443-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 443-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 443-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 443-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 443-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 443-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS S7-1200 CP 1243-1 RAIL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS S7-1200 CP 1243-1 RAIL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS S7-1200 CP 1243-1 RAIL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS S7-1200 CP 1243-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS S7-1200 CP 1243-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS S7-1200 CP 1243-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS TIM 1531 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS TIM 1531 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIRIUS ACT 3SU1 interface module PROFINET\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIRIUS Motor Starter M200D PROFINET\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIRIUS Soft Starter 3RW44 PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIRIUS Soft Starter 3RW44 PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSITOP Manager\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSITOP PSU8600 PROFINET\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSITOP PSU8600\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSITOP UPS1600 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSITOP UPS1600 PROFINET (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSiveillance Command\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSiveillance Control Pro\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSiveillance Identity V1.5\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSiveillance Identity V1.6\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSiveillance Vantage\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSOFTNET-IE PNIO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSOFTNET-IE PNIO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSoftnet PROFINET IO for PC-based Windows systems\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSolid Edge CAM Pro\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSolid Edge Harness Design\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSolid Edge SE2021\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-301589.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSolid Edge SE2022\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-301589.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSpectrum Power 4\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSpectrum Power 4\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-831168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSpectrum Power 7\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSPPA-T3000 SeS3000 Security Server (6DU7054-0..00-..A0)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-714170.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Active Workspace\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Briefcase Browser\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Data Share Manager\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Deployment Center\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Dispatcher Service\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter EDA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter FMS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Integration for CATIA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Integration Framework\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter MBSE Gateway\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Mendix Connector\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Microservices Framework\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Polarion Integration\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Rapid Start\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Reporting and Analytics V11\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Reporting and Analytics V12.2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Reporting and Analytics V12.3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Reporting and Analytics V12.4\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Reporting and Analytics V13\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Retail Footwear and Apparel\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Security Services\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Supplier Collaboration\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter System Modeling Workbench\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Technical Publishing\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Visualization V12.4\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-301589.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Visualization V13.1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-301589.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Visualization V13.2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-301589.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Visualization V13.3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-301589.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTecnomatix eBOP Manager Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTecnomatix Intosite\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTecnomatix Plant Simulation\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTecnomatix Process Designer\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTecnomatix Process Simulate\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTecnomatix Process Simulate VCLite\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTecnomatix RobotExpert\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeleControl Server Basic\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIA Administrator\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIA Administrator\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 1531 IRC (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 1531 IRC (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-838121.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 1531 IRC (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 1531 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 1531 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 3V-IE Advanced (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 3V-IE DNP3 (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 3V-IE (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 4R-IE DNP3 (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 4R-IE (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eValor Parts Library - VPL Direct\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eValor Parts Library - VPL Server or Service\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eVeSys\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition Enterprise VX.2.10\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition Enterprise VX.2.6\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition Enterprise VX.2.7\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition Enterprise VX.2.8\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition Enterprise (XCR) VX.2.10\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition IC Packaging VX.2.10\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition IC Packaging VX.2.6\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition IC Packaging VX.2.7\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition IC Packaging VX.2.8\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition IC Packaging (XCR) VX.2.10\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003c/tbody\u003e \u003c/table\u003e ",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-40360",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40360"
},
{
"name": "CVE-2016-1547",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1547"
},
{
"name": "CVE-2021-37186",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37186"
},
{
"name": "CVE-2020-26139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26139"
},
{
"name": "CVE-2016-4956",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4956"
},
{
"name": "CVE-2021-37198",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37198"
},
{
"name": "CVE-2016-4953",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4953"
},
{
"name": "CVE-2021-40363",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40363"
},
{
"name": "CVE-2021-46151",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46151"
},
{
"name": "CVE-2021-44018",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44018"
},
{
"name": "CVE-2022-23312",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23312"
},
{
"name": "CVE-2021-41990",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41990"
},
{
"name": "CVE-2015-5621",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5621"
},
{
"name": "CVE-2021-46161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46161"
},
{
"name": "CVE-2021-41991",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41991"
},
{
"name": "CVE-2021-46160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46160"
},
{
"name": "CVE-2022-23102",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23102"
},
{
"name": "CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"name": "CVE-2019-13933",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13933"
},
{
"name": "CVE-2019-8460",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8460"
},
{
"name": "CVE-2019-6575",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6575"
},
{
"name": "CVE-2020-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26146"
},
{
"name": "CVE-2020-26143",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26143"
},
{
"name": "CVE-2019-6568",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6568"
},
{
"name": "CVE-2016-1550",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1550"
},
{
"name": "CVE-2015-7705",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7705"
},
{
"name": "CVE-2021-46156",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46156"
},
{
"name": "CVE-2021-37197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37197"
},
{
"name": "CVE-2016-7433",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7433"
},
{
"name": "CVE-2021-37194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37194"
},
{
"name": "CVE-2021-46153",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46153"
},
{
"name": "CVE-2016-4955",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4955"
},
{
"name": "CVE-2015-7853",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7853"
},
{
"name": "CVE-2021-46152",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46152"
},
{
"name": "CVE-2017-2680",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2680"
},
{
"name": "CVE-2015-8138",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8138"
},
{
"name": "CVE-2020-12360",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12360"
},
{
"name": "CVE-2016-4954",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4954"
},
{
"name": "CVE-2020-24588",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24588"
},
{
"name": "CVE-2021-37185",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37185"
},
{
"name": "CVE-2021-46154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46154"
},
{
"name": "CVE-2020-26140",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26140"
},
{
"name": "CVE-2021-37195",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37195"
},
{
"name": "CVE-2020-8703",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8703"
},
{
"name": "CVE-2019-10936",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10936"
},
{
"name": "CVE-2020-12357",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12357"
},
{
"name": "CVE-2021-46159",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46159"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2017-12741",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12741"
},
{
"name": "CVE-2021-40358",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40358"
},
{
"name": "CVE-2019-10923",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10923"
},
{
"name": "CVE-2021-43336",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43336"
},
{
"name": "CVE-2020-26144",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26144"
},
{
"name": "CVE-2021-44000",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44000"
},
{
"name": "CVE-2021-20094",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20094"
},
{
"name": "CVE-2020-24513",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24513"
},
{
"name": "CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"name": "CVE-2021-20093",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20093"
},
{
"name": "CVE-2021-38405",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38405"
},
{
"name": "CVE-2020-24507",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24507"
},
{
"name": "CVE-2021-46155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46155"
},
{
"name": "CVE-2020-13987",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13987"
},
{
"name": "CVE-2021-45046",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45046"
},
{
"name": "CVE-2020-12358",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12358"
},
{
"name": "CVE-2021-37196",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37196"
},
{
"name": "CVE-2021-40364",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40364"
},
{
"name": "CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"name": "CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"name": "CVE-2021-37204",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37204"
},
{
"name": "CVE-2019-19300",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19300"
},
{
"name": "CVE-2019-13946",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13946"
},
{
"name": "CVE-2019-10942",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10942"
},
{
"name": "CVE-2020-8670",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8670"
},
{
"name": "CVE-2017-2681",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2681"
},
{
"name": "CVE-2016-2518",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2518"
},
{
"name": "CVE-2020-8704",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8704"
},
{
"name": "CVE-2020-28400",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28400"
},
{
"name": "CVE-2021-46158",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46158"
},
{
"name": "CVE-2021-44228",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44228"
},
{
"name": "CVE-2016-7431",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7431"
},
{
"name": "CVE-2021-3712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
},
{
"name": "CVE-2020-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26141"
},
{
"name": "CVE-2020-24486",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24486"
},
{
"name": "CVE-2020-24506",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24506"
},
{
"name": "CVE-2021-46157",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46157"
},
{
"name": "CVE-2021-45106",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45106"
},
{
"name": "CVE-2020-24512",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24512"
},
{
"name": "CVE-2020-17437",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-17437"
},
{
"name": "CVE-2021-44016",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44016"
},
{
"name": "CVE-2020-24511",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24511"
},
{
"name": "CVE-2021-40359",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40359"
},
{
"name": "CVE-2021-37205",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37205"
},
{
"name": "CVE-2018-18065",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18065"
},
{
"name": "CVE-2017-6458",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6458"
},
{
"name": "CVE-2016-1548",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1548"
},
{
"name": "CVE-2019-19301",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19301"
},
{
"name": "CVE-2016-9042",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9042"
},
{
"name": "CVE-2020-26145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26145"
}
],
"initial_release_date": "2022-02-09T00:00:00",
"last_revision_date": "2022-02-09T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-124",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-02-09T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSiemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-541018 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-541018.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-914168 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-914168.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-309571 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-309571.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-675303 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-675303.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-244969 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-244969.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-654775 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-654775.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-316383 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-316383.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-100232 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-100232.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-480230 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-480230.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-978220 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-978220.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-840188 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-840188.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-211752 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-211752.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-772220 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-772220.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-539476 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-539476.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-599968 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-599968.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-443566 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-443566.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-995338 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-995338.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-462066 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-462066.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-102233 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-102233.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-301589 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-301589.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-669737 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-669737.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-609880 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-609880.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssb-439005 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssb-439005.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-473245 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-473245.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-831168 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-831168.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-593272 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-593272.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-838121 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-838121.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-307392 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-307392.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-780073 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-780073.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-349422 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-349422.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-346262 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-346262.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-293562 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-293562.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-913875 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-913875.html"
}
]
}
CERTFR-2021-AVI-864
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian 8 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 8 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 8 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 8 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV 8 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 8 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le | ||
| Red Hat | N/A | Red Hat Virtualization Host 4 for RHEL 8 x86_64 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux for Power, little endian 8 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 8 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 8 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 8 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 8 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Virtualization Host 4 for RHEL 8 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-29368",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29368"
},
{
"name": "CVE-2020-26139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26139"
},
{
"name": "CVE-2021-20239",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20239"
},
{
"name": "CVE-2020-24587",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24587"
},
{
"name": "CVE-2021-3600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3600"
},
{
"name": "CVE-2020-27777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27777"
},
{
"name": "CVE-2021-3679",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3679"
},
{
"name": "CVE-2021-31440",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31440"
},
{
"name": "CVE-2020-29660",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29660"
},
{
"name": "CVE-2020-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26146"
},
{
"name": "CVE-2020-26143",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26143"
},
{
"name": "CVE-2021-31916",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31916"
},
{
"name": "CVE-2021-3635",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3635"
},
{
"name": "CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"name": "CVE-2020-24504",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24504"
},
{
"name": "CVE-2020-24588",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24588"
},
{
"name": "CVE-2021-28971",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28971"
},
{
"name": "CVE-2021-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23133"
},
{
"name": "CVE-2020-26140",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26140"
},
{
"name": "CVE-2021-3659",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3659"
},
{
"name": "CVE-2020-24586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24586"
},
{
"name": "CVE-2020-24502",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24502"
},
{
"name": "CVE-2021-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0129"
},
{
"name": "CVE-2020-36158",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36158"
},
{
"name": "CVE-2020-36386",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36386"
},
{
"name": "CVE-2020-26144",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26144"
},
{
"name": "CVE-2021-28950",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28950"
},
{
"name": "CVE-2021-29650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
},
{
"name": "CVE-2021-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3564"
},
{
"name": "CVE-2021-3489",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3489"
},
{
"name": "CVE-2020-24503",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24503"
},
{
"name": "CVE-2021-3348",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3348"
},
{
"name": "CVE-2021-20194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20194"
},
{
"name": "CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"name": "CVE-2021-3732",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3732"
},
{
"name": "CVE-2021-29155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29155"
},
{
"name": "CVE-2020-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26141"
},
{
"name": "CVE-2021-33200",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33200"
},
{
"name": "CVE-2021-31829",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31829"
},
{
"name": "CVE-2020-0427",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0427"
},
{
"name": "CVE-2021-29646",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29646"
},
{
"name": "CVE-2020-26145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26145"
}
],
"initial_release_date": "2021-11-12T00:00:00",
"last_revision_date": "2021-11-12T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-864",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-11-12T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRed Hat. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de service\net un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:4356 du 10 novembre 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:4356"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:4140 du 09 novembre 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:4140"
}
]
}
CERTFR-2021-AVI-469
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Basesystem 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Development Tools 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Public Cloud 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Legacy Software 15-SP3 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise High Availability 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Basesystem 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Development Tools 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Public Cloud 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Legacy Software 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-26139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26139"
},
{
"name": "CVE-2021-29264",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29264"
},
{
"name": "CVE-2020-24587",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24587"
},
{
"name": "CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"name": "CVE-2020-25672",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25672"
},
{
"name": "CVE-2021-30002",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30002"
},
{
"name": "CVE-2021-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
},
{
"name": "CVE-2021-3483",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3483"
},
{
"name": "CVE-2020-36312",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36312"
},
{
"name": "CVE-2020-36311",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36311"
},
{
"name": "CVE-2021-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27363"
},
{
"name": "CVE-2021-3490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3490"
},
{
"name": "CVE-2021-27364",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27364"
},
{
"name": "CVE-2021-29647",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29647"
},
{
"name": "CVE-2020-24588",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24588"
},
{
"name": "CVE-2021-28971",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28971"
},
{
"name": "CVE-2020-35519",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35519"
},
{
"name": "CVE-2020-27815",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27815"
},
{
"name": "CVE-2021-28952",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28952"
},
{
"name": "CVE-2020-36310",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36310"
},
{
"name": "CVE-2021-27365",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27365"
},
{
"name": "CVE-2021-3428",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3428"
},
{
"name": "CVE-2020-27170",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27170"
},
{
"name": "CVE-2020-24586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24586"
},
{
"name": "CVE-2021-29265",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29265"
},
{
"name": "CVE-2021-3444",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3444"
},
{
"name": "CVE-2021-28038",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28038"
},
{
"name": "CVE-2019-19769",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19769"
},
{
"name": "CVE-2020-25671",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25671"
},
{
"name": "CVE-2021-28950",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28950"
},
{
"name": "CVE-2021-29650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
},
{
"name": "CVE-2020-36322",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36322"
},
{
"name": "CVE-2021-28688",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28688"
},
{
"name": "CVE-2021-3489",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3489"
},
{
"name": "CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"name": "CVE-2021-20268",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20268"
},
{
"name": "CVE-2021-29155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29155"
},
{
"name": "CVE-2020-25670",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25670"
},
{
"name": "CVE-2020-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26141"
},
{
"name": "CVE-2021-28972",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28972"
},
{
"name": "CVE-2021-23134",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23134"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2019-18814",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18814"
},
{
"name": "CVE-2021-28660",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28660"
},
{
"name": "CVE-2021-3491",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3491"
},
{
"name": "CVE-2021-33200",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33200"
},
{
"name": "CVE-2021-28964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28964"
},
{
"name": "CVE-2020-25673",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25673"
},
{
"name": "CVE-2020-27673",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27673"
},
{
"name": "CVE-2020-27171",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27171"
},
{
"name": "CVE-2021-28375",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28375"
},
{
"name": "CVE-2020-26145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26145"
}
],
"initial_release_date": "2021-06-17T00:00:00",
"last_revision_date": "2021-06-17T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-469",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-06-17T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service et un contournement de\nla politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20211977-1 du 15 juin 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20211977-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20211975-1 du 15 juin 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20211975-1"
}
]
}
CERTFR-2021-AVI-570
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3-BCL | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3-LTSS | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 12-SP3 | ||
| SUSE | N/A | HPE Helion Openstack 8 | ||
| SUSE | N/A | SUSE OpenStack Cloud 8 | ||
| SUSE | N/A | SUSE OpenStack Cloud Crowbar 8 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP3 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server 12-SP3-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "HPE Helion Openstack 8",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud 8",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud Crowbar 8",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-26139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26139"
},
{
"name": "CVE-2020-24587",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24587"
},
{
"name": "CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"name": "CVE-2021-34693",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34693"
},
{
"name": "CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"name": "CVE-2021-0605",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0605"
},
{
"name": "CVE-2020-24588",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24588"
},
{
"name": "CVE-2021-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23133"
},
{
"name": "CVE-2020-24586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24586"
},
{
"name": "CVE-2021-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0129"
},
{
"name": "CVE-2020-36386",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36386"
},
{
"name": "CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"name": "CVE-2021-0512",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0512"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2020-26558",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26558"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"name": "CVE-2020-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26141"
},
{
"name": "CVE-2021-23134",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23134"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2020-26145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26145"
}
],
"initial_release_date": "2021-07-23T00:00:00",
"last_revision_date": "2021-07-23T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-570",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-07-23T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service, une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte \u00e0 la confidentialit\u00e9 des\ndonn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212453-1 du 22 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212453-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212451-1 du 22 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212451-1/"
}
]
}
CERTFR-2021-AVI-751
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Google Android. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Google Android toutes versions sans le correctif du 04 octobre 2021",
"product": {
"name": "Android",
"vendor": {
"name": "Google",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-1967",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1967"
},
{
"name": "CVE-2020-11303",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11303"
},
{
"name": "CVE-2020-29368",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29368"
},
{
"name": "CVE-2021-0651",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0651"
},
{
"name": "CVE-2020-26139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26139"
},
{
"name": "CVE-2021-0707",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0707"
},
{
"name": "CVE-2020-24587",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24587"
},
{
"name": "CVE-2020-25285",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25285"
},
{
"name": "CVE-2021-0870",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0870"
},
{
"name": "CVE-2020-29660",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29660"
},
{
"name": "CVE-2021-1969",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1969"
},
{
"name": "CVE-2021-1932",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1932"
},
{
"name": "CVE-2020-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26146"
},
{
"name": "CVE-2021-1949",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1949"
},
{
"name": "CVE-2021-38166",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38166"
},
{
"name": "CVE-2021-31916",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31916"
},
{
"name": "CVE-2021-0702",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0702"
},
{
"name": "CVE-2021-1917",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1917"
},
{
"name": "CVE-2021-1984",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1984"
},
{
"name": "CVE-2021-3490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3490"
},
{
"name": "CVE-2021-29647",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29647"
},
{
"name": "CVE-2021-30258",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30258"
},
{
"name": "CVE-2020-24588",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24588"
},
{
"name": "CVE-2021-0643",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0643"
},
{
"name": "CVE-2020-11301",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11301"
},
{
"name": "CVE-2021-30257",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30257"
},
{
"name": "CVE-2020-26140",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26140"
},
{
"name": "CVE-2021-0652",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0652"
},
{
"name": "CVE-2019-25045",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25045"
},
{
"name": "CVE-2021-30288",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30288"
},
{
"name": "CVE-2021-0703",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0703"
},
{
"name": "CVE-2021-30292",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30292"
},
{
"name": "CVE-2021-1983",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1983"
},
{
"name": "CVE-2021-1959",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1959"
},
{
"name": "CVE-2020-15358",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15358"
},
{
"name": "CVE-2020-10768",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10768"
},
{
"name": "CVE-2021-1936",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1936"
},
{
"name": "CVE-2021-30297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30297"
},
{
"name": "CVE-2021-30291",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30291"
},
{
"name": "CVE-2021-0941",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0941"
},
{
"name": "CVE-2021-1980",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1980"
},
{
"name": "CVE-2021-0705",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0705"
},
{
"name": "CVE-2020-11264",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11264"
},
{
"name": "CVE-2021-0706",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0706"
},
{
"name": "CVE-2021-1985",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1985"
},
{
"name": "CVE-2021-3489",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3489"
},
{
"name": "CVE-2021-27666",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27666"
},
{
"name": "CVE-2021-0935",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0935"
},
{
"name": "CVE-2021-0940",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0940"
},
{
"name": "CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"name": "CVE-2021-0937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0937"
},
{
"name": "CVE-2021-0939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0939"
},
{
"name": "CVE-2021-29155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29155"
},
{
"name": "CVE-2021-30305",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30305"
},
{
"name": "CVE-2021-1977",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1977"
},
{
"name": "CVE-2020-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26141"
},
{
"name": "CVE-2021-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0938"
},
{
"name": "CVE-2021-0483",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0483"
},
{
"name": "CVE-2021-20292",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20292"
},
{
"name": "CVE-2021-0708",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0708"
},
{
"name": "CVE-2021-30256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30256"
},
{
"name": "CVE-2021-1913",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1913"
},
{
"name": "CVE-2021-30312",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30312"
},
{
"name": "CVE-2021-30310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30310"
},
{
"name": "CVE-2021-1968",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1968"
},
{
"name": "CVE-2021-0936",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0936"
},
{
"name": "CVE-2021-1966",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1966"
},
{
"name": "CVE-2021-29646",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29646"
},
{
"name": "CVE-2021-30302",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30302"
},
{
"name": "CVE-2021-30306",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30306"
},
{
"name": "CVE-2020-26145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26145"
}
],
"initial_release_date": "2021-10-05T00:00:00",
"last_revision_date": "2021-10-05T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-751",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-10-05T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Google Android.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Google Android",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Android du 04 octobre 2021",
"url": "https://source.android.com/security/bulletin/2021-10-01"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Pixel du 04 octobre 2021",
"url": "https://source.android.com/security/bulletin/pixel/2021-10-01"
}
]
}
CERTFR-2022-AVI-706
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Belden. Elles permettent à un attaquant de provoquer un déni de service et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "BAT-C2 versions ant\u00e9rieures \u00e0 09.12.01.00R01",
"product": {
"name": "N/A",
"vendor": {
"name": "Belden",
"scada": true
}
}
},
{
"description": "OpenBAT, WLC, BAT450 versions ant\u00e9rieures \u00e0 10.12-RU6, 10.12-RU7",
"product": {
"name": "N/A",
"vendor": {
"name": "Belden",
"scada": true
}
}
},
{
"description": "EagleSDV versions ant\u00e9rieures \u00e0 05.4.02",
"product": {
"name": "N/A",
"vendor": {
"name": "Belden",
"scada": true
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-261471",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-261471"
},
{
"name": "CVE-2020-24587",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24587"
},
{
"name": "CVE-2020-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26146"
},
{
"name": "CVE-2020-24588",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24588"
},
{
"name": "CVE-2020-24586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24586"
},
{
"name": "CVE-2020-26144",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26144"
},
{
"name": "CVE-2020-26142",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26142"
},
{
"name": "CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"name": "CVE-2020-26145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26145"
}
],
"initial_release_date": "2022-08-04T00:00:00",
"last_revision_date": "2022-08-04T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-706",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-08-04T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nBelden. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service\net une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Belden",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Belden BSECV-2022-13 du 01 ao\u00fbt 2022",
"url": "https://dam.belden.com/dmm3bwsv3/assetstream.aspx?assetid=14662\u0026mediaformatid=50063\u0026destinationid=10016"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Belden BSECV-2021-16 du 01 ao\u00fbt 2022",
"url": "https://dam.belden.com/dmm3bwsv3/assetstream.aspx?assetid=14146\u0026mediaformatid=50063\u0026destinationid=10016"
}
]
}
CERTFR-2021-AVI-563
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise Module for Basesystem 15-SP2 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP4-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3-LTSS | ||
| SUSE | N/A | SUSE CaaS Platform 4.0 | ||
| SUSE | N/A | SUSE OpenStack Cloud Crowbar 9 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Realtime 15-SP2 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-ESPOS | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS | ||
| SUSE | N/A | SUSE MicroOS 5.0 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 12-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 15-SP1 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.0 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Legacy Software 15-SP2 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.0 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP1-BCL | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Development Tools 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP1-LTSS | ||
| SUSE | N/A | SUSE OpenStack Cloud 9 | ||
| SUSE | N/A | SUSE Enterprise Storage 6 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 15 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.0 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Module for Basesystem 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE CaaS Platform 4.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud Crowbar 9",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Realtime 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE MicroOS 5.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 15-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.0",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Legacy Software 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.0",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP1-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Development Tools 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud 9",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Enterprise Storage 6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 15",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.0",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-26139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26139"
},
{
"name": "CVE-2020-24587",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24587"
},
{
"name": "CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"name": "CVE-2021-34693",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34693"
},
{
"name": "CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"name": "CVE-2021-0605",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0605"
},
{
"name": "CVE-2021-35039",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35039"
},
{
"name": "CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"name": "CVE-2020-24588",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24588"
},
{
"name": "CVE-2021-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23133"
},
{
"name": "CVE-2020-24586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24586"
},
{
"name": "CVE-2021-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0129"
},
{
"name": "CVE-2020-36386",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36386"
},
{
"name": "CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"name": "CVE-2021-0512",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0512"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2020-26558",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26558"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2021-33624",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33624"
},
{
"name": "CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"name": "CVE-2021-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3612"
},
{
"name": "CVE-2020-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26141"
},
{
"name": "CVE-2021-23134",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23134"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2021-3491",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3491"
},
{
"name": "CVE-2021-33200",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33200"
},
{
"name": "CVE-2020-26145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26145"
}
],
"initial_release_date": "2021-07-22T00:00:00",
"last_revision_date": "2021-07-22T00:00:00",
"links": [
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-24586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24586"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-33624",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33624"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-33200",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33200"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3612"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-34693",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34693"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212427-1 du 21 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212427-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212422-1 du 21 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212422-1/"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-26558",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26558"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212421-1 du 21 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212421-1/"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-24587",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24587"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26141"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-26139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26139"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-3491",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3491"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-0605",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0605"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-35039",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35039"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-23134",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23134"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212426-1 du 21 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212426-1/"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-0512",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0512"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-24588",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24588"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212433-1 du 21 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212433-1"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-26145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26145"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0129"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23133"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-36386",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36386"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212438-1 du 21 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212438-1/"
}
],
"reference": "CERTFR-2021-AVI-563",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-07-22T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service et une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": []
}
CERTFR-2021-AVI-452
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise Module for Basesystem 15-SP2 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP4-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP5 | ||
| SUSE | N/A | SUSE CaaS Platform 4.0 | ||
| SUSE | N/A | SUSE OpenStack Cloud Crowbar 9 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Realtime 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time Extension 12-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Realtime 15-SP3 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS | ||
| SUSE | N/A | SUSE Linux Enterprise Software Development Kit 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP5 | ||
| SUSE | N/A | SUSE MicroOS 5.0 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 15-SP1 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.0 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Legacy Software 15-SP2 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.0 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP1-BCL | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Development Tools 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP1-LTSS | ||
| SUSE | N/A | SUSE OpenStack Cloud 9 | ||
| SUSE | N/A | SUSE Enterprise Storage 6 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Public Cloud 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP4 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.0 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 12-SP5 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Module for Basesystem 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE CaaS Platform 4.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud Crowbar 9",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Realtime 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time Extension 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Realtime 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Software Development Kit 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE MicroOS 5.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 15-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.0",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Legacy Software 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.0",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP1-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Development Tools 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud 9",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Enterprise Storage 6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Public Cloud 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.0",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-26139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26139"
},
{
"name": "CVE-2020-24587",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24587"
},
{
"name": "CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"name": "CVE-2020-24588",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24588"
},
{
"name": "CVE-2021-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23133"
},
{
"name": "CVE-2020-24586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24586"
},
{
"name": "CVE-2021-29650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
},
{
"name": "CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"name": "CVE-2021-29155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29155"
},
{
"name": "CVE-2020-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26141"
},
{
"name": "CVE-2021-23134",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23134"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2021-3491",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3491"
},
{
"name": "CVE-2021-33200",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33200"
},
{
"name": "CVE-2020-26145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26145"
}
],
"initial_release_date": "2021-06-10T00:00:00",
"last_revision_date": "2021-06-10T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-452",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-06-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service \u00e0 distance et une\natteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20211913-1 du 09 juin 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20211913-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20211912-1 du 09 juin 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20211912-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20211899-1 du 08 juin 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20211899-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20211888-1 du 08 juin 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20211888-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20211887-1 du 08 juin 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20211887-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20211889-1 du 08 juin 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20211889-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20211891-1 du 08 juin 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20211891-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20211915-1 du 09 juin 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20211915-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20211890-1 du 08 juin 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20211890-1/"
}
]
}
CERTFR-2021-AVI-483
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 21.04",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-26139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26139"
},
{
"name": "CVE-2020-24587",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24587"
},
{
"name": "CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"name": "CVE-2021-3600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3600"
},
{
"name": "CVE-2020-25672",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25672"
},
{
"name": "CVE-2021-31440",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31440"
},
{
"name": "CVE-2021-3543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3543"
},
{
"name": "CVE-2020-24588",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24588"
},
{
"name": "CVE-2021-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23133"
},
{
"name": "CVE-2021-3506",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3506"
},
{
"name": "CVE-2020-24586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24586"
},
{
"name": "CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"name": "CVE-2020-25671",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25671"
},
{
"name": "CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"name": "CVE-2021-29155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29155"
},
{
"name": "CVE-2020-25670",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25670"
},
{
"name": "CVE-2020-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26141"
},
{
"name": "CVE-2021-23134",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23134"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2021-33200",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33200"
},
{
"name": "CVE-2021-31829",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31829"
},
{
"name": "CVE-2020-25673",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25673"
},
{
"name": "CVE-2020-26145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26145"
}
],
"initial_release_date": "2021-06-24T00:00:00",
"last_revision_date": "2021-06-24T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-483",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-06-24T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux\nd\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire, un d\u00e9ni de service et une atteinte \u00e0\nla confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 le noyau Linux d\u0027Ubuntu USN-4997-1 du 23 juin 2021",
"url": "https://ubuntu.com/security/notices/USN-4997-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 le noyau Linux d\u0027Ubuntu USN-5003-1 du 23 juin 2021",
"url": "https://ubuntu.com/security/notices/USN-5003-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 le noyau Linux d\u0027Ubuntu USN-4999-1 du 23 juin 2021",
"url": "https://ubuntu.com/security/notices/USN-4999-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 le noyau Linux d\u0027Ubuntu USN-5001-1 du 23 juin 2021",
"url": "https://ubuntu.com/security/notices/USN-5001-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 le noyau Linux d\u0027Ubuntu USN-5000-1 du 23 juin 2021",
"url": "https://ubuntu.com/security/notices/USN-5000-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 le noyau Linux d\u0027Ubuntu USN-5002-1 du 23 juin 2021",
"url": "https://ubuntu.com/security/notices/USN-5002-1"
}
]
}
gsd-2020-26145
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2020-26145",
"description": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.",
"id": "GSD-2020-26145",
"references": [
"https://www.suse.com/security/cve/CVE-2020-26145.html",
"https://access.redhat.com/errata/RHSA-2021:4356",
"https://access.redhat.com/errata/RHSA-2021:4140",
"https://ubuntu.com/security/CVE-2020-26145",
"https://advisories.mageia.org/CVE-2020-26145.html",
"https://security.archlinux.org/CVE-2020-26145",
"https://linux.oracle.com/cve/CVE-2020-26145.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2020-26145"
],
"details": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.",
"id": "GSD-2020-26145",
"modified": "2023-12-13T01:22:09.251216Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2020-26145",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.fragattacks.com",
"refsource": "MISC",
"url": "https://www.fragattacks.com"
},
{
"name": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md",
"refsource": "MISC",
"url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md"
},
{
"name": "[oss-security] 20210511 various 802.11 security issues - fragattacks.com",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2021/05/11/12"
},
{
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf",
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:samsung:galaxy_i9305_firmware:4.4.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:samsung:galaxy_i9305:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:6gk5763-1al00-7da0_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "1.2",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:6gk5763-1al00-7da0:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:6gk5766-1ge00-7da0_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "1.2",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:6gk5766-1ge00-7da0:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:6gk5766-1ge00-7db0_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "1.2",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:6gk5766-1ge00-7db0:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:6gk5766-1je00-7da0_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "1.2",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:6gk5766-1je00-7da0:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:6gk5766-1ge00-7ta0_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "1.2",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:6gk5766-1ge00-7ta0:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:6gk5766-1ge00-7tb0_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "1.2",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:6gk5766-1ge00-7tb0:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:6gk5766-1je00-7ta0_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "1.2",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:6gk5766-1je00-7ta0:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:6gk5763-1al00-3aa0_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "1.2",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:6gk5763-1al00-3aa0:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:6gk5763-1al00-3da0_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "1.2",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:6gk5763-1al00-3da0:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:6gk5766-1ge00-3da0_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "1.2",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:6gk5766-1ge00-3da0:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:6gk5766-1ge00-3db0_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "1.2",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:6gk5766-1ge00-3db0:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:6gk5766-1je00-3da0_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "1.2",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:6gk5766-1je00-3da0:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2020-26145"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.fragattacks.com",
"refsource": "MISC",
"tags": [
"Third Party Advisory"
],
"url": "https://www.fragattacks.com"
},
{
"name": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md",
"refsource": "MISC",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md"
},
{
"name": "[oss-security] 20210511 various 802.11 security issues - fragattacks.com",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2021/05/11/12"
},
{
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf",
"refsource": "CONFIRM",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.5,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
},
"lastModifiedDate": "2022-05-13T20:53Z",
"publishedDate": "2021-05-11T20:15Z"
}
}
}
cnvd-2021-34681
Vulnerability from cnvd
目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://www.wi-fi.org/security-update-fragmentation
| Name | Samsung Samsung Galaxy S3 i9305 4.4.4 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2020-26145"
}
},
"description": "Samsung Galaxy S3\u662f\u97e9\u56fd\u4e09\u661f\uff08Samsung\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u667a\u80fd\u624b\u673a\u3002\n\nSamsung Galaxy S3 i9305 4.4.4\u7248\u672c\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u4ee5\u6ce8\u5165\u72ec\u7acb\u4e8e\u7f51\u7edc\u914d\u7f6e\u7684\u4efb\u610f\u7f51\u7edc\u6570\u636e\u5305\u3002",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://www.wi-fi.org/security-update-fragmentation",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2021-34681",
"openTime": "2021-05-14",
"patchDescription": "Samsung Galaxy S3\u662f\u97e9\u56fd\u4e09\u661f\uff08Samsung\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u667a\u80fd\u624b\u673a\u3002\r\n\r\nSamsung Galaxy S3 i9305 4.4.4\u7248\u672c\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u4ee5\u6ce8\u5165\u72ec\u7acb\u4e8e\u7f51\u7edc\u914d\u7f6e\u7684\u4efb\u610f\u7f51\u7edc\u6570\u636e\u5305\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Samsung Galaxy S3\u8f93\u5165\u9a8c\u8bc1\u9519\u8bef\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "Samsung Samsung Galaxy S3 i9305 4.4.4"
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2020-26145",
"serverity": "\u4e2d",
"submitTime": "2021-05-14",
"title": "Samsung Galaxy S3\u8f93\u5165\u9a8c\u8bc1\u9519\u8bef\u6f0f\u6d1e"
}
suse-su-2021:1890-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-33200: Enforcing incorrect limits for pointer arithmetic operations by the BPF verifier could be abused to perform out-of-bounds reads and writes in kernel memory (bsc#1186484).\n- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values. (bsc#1186111)\n- CVE-2020-26139: Fixed a denial-of-service when an Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. (bnc#1186062)\n- CVE-2021-23134: A Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges. (bnc#1186060)\n- CVE-2021-3491: Fixed a potential heap overflow in mem_rw(). This vulnerability is related to the PROVIDE_BUFFERS operation, which allowed the MAX_RW_COUNT limit to be bypassed (bsc#1185642).\n- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).\n- CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances this can be abused to inject arbitrary network packets and/or exfiltrate user data (bnc#1185859).\n- CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed (bnc#1185859 bnc#1185862).\n- CVE-2020-26147: The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments, even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used (bnc#1185859).\n- CVE-2020-24588: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets. (bnc#1185861)\n- CVE-2020-26145: An issue was discovered with Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration. (bnc#1185860)\n- CVE-2020-26141: An issue was discovered in the ALFA driver for AWUS036H, where the Message Integrity Check (authenticity) of fragmented TKIP frames was not verified. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bnc#1185987)\n\nThe following non-security bugs were fixed:\n\n- ACPI / hotplug / PCI: Fix reference count leak in enable_slot() (git-fixes).\n- ACPI: GTDT: Do not corrupt interrupt mappings on watchdow probe failure (git-fixes).\n- ACPI: custom_method: fix a possible memory leak (git-fixes).\n- ACPI: custom_method: fix potential use-after-free issue (git-fixes).\n- ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro (git-fixes).\n- ALSA: bebob: enable to deliver MIDI messages for multiple ports (git-fixes).\n- ALSA: dice: fix stream format at middle sampling rate for Alesis iO 26 (git-fixes).\n- ALSA: dice: fix stream format for TC Electronic Konnekt Live at high sampling transfer frequency (git-fixes).\n- ALSA: firewire-lib: fix calculation for size of IR context payload (git-fixes).\n- ALSA: firewire-lib: fix check for the size of isochronous packet payload (git-fixes).\n- ALSA: hda/conexant: Re-order CX5066 quirk table entries (git-fixes).\n- ALSA: hda/realtek: ALC285 Thinkpad jack pin quirk is unreachable (git-fixes).\n- ALSA: hda/realtek: Add some CLOVE SSIDs of ALC293 (git-fixes).\n- ALSA: hda/realtek: Headphone volume is controlled by Front mixer (git-fixes).\n- ALSA: hda/realtek: reset eapd coeff to default value for alc287 (git-fixes).\n- ALSA: hda: fixup headset for ASUS GU502 laptop (git-fixes).\n- ALSA: hda: generic: change the DAC ctl name for LO+SPK or LO+HP (git-fixes).\n- ALSA: hdsp: do not disable if not enabled (git-fixes).\n- ALSA: hdspm: do not disable if not enabled (git-fixes).\n- ALSA: intel8x0: Do not update period unless prepared (git-fixes).\n- ALSA: line6: Fix racy initialization of LINE6 MIDI (git-fixes).\n- ALSA: rme9652: do not disable if not enabled (git-fixes).\n- ALSA: usb-audio: Validate MS endpoint descriptors (git-fixes).\n- ALSA: usb-audio: fix control-request direction (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix device hang with ehci-pci (git-fixes).\n- ALSA: usb-audio: scarlett2: Improve driver startup messages (git-fixes).\n- ALSA: usb-audio: scarlett2: snd_scarlett_gen2_controls_create() can be static (git-fixes).\n- ARM64: vdso32: Install vdso32 from vdso_install (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for the Chuwi Hi8 tablet (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Enable jack-detect support on Asus T100TAF (git-fixes).\n- ASoC: cs35l33: fix an error code in probe() (git-fixes).\n- ASoC: cs42l42: Regmap must use_single_read/write (git-fixes).\n- ASoC: rsnd: call rsnd_ssi_master_clk_start() from rsnd_ssi_init() (git-fixes).\n- ASoC: rsnd: core: Check convert rate in rsnd_hw_params (git-fixes).\n- ASoC: rt286: Generalize support for ALC3263 codec (git-fixes).\n- ASoC: rt286: Make RT286_SET_GPIO_* readable and writable (git-fixes).\n- Bluetooth: L2CAP: Fix handling LE modes by L2CAP_OPTIONS (git-fixes).\n- Bluetooth: SMP: Fail if remote and local public keys are identical (git-fixes).\n- Bluetooth: Set CONF_NOT_COMPLETE as l2cap_chan default (git-fixes).\n- Bluetooth: check for zapped sk before connecting (git-fixes).\n- Bluetooth: initialize skb_queue_head at l2cap_chan_create() (git-fixes).\n- Drivers: hv: vmbus: Fix Suspend-to-Idle for Generation-2 VM (git-fixes).\n- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185725).\n- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185725).\n- Drivers: hv: vmbus: Use after free in __vmbus_open() (git-fixes).\n- Input: elants_i2c - do not bind to i2c-hid compatible ACPI instantiated devices (git-fixes).\n- Input: silead - add workaround for x86 BIOS-es which bring the chip up in a stuck state (git-fixes).\n- KVM: s390: fix guarded storage control register handling (bsc#1133021).\n- Move upstreamed media fixes into sorted section\n- NFC: nci: fix memory leak in nci_allocate_device (git-fixes).\n- PCI/RCEC: Fix RCiEP device to RCEC association (git-fixes).\n- PCI: Allow VPD access for QLogic ISP2722 (git-fixes).\n- PCI: PM: Do not read power state in pci_enable_device_flags() (git-fixes).\n- PCI: Release OF node in pci_scan_device()\u0027s error path (git-fixes).\n- PCI: endpoint: Fix missing destroy_workqueue() (git-fixes).\n- PCI: iproc: Fix return value of iproc_msi_irq_domain_alloc() (git-fixes).\n- PCI: thunder: Fix compile testing (git-fixes).\n- PM / devfreq: Use more accurate returned new_freq as resume_freq (git-fixes).\n- RDMA/addr: create addr_wq with WQ_MEM_RECLAIM flag (bsc#1183346).\n- RDMA/core: create ib_cm with WQ_MEM_RECLAIM flag (bsc#1183346).\n- RDMA/hns: Delete redundant abnormal interrupt status (git-fixes).\n- RDMA/hns: Delete redundant condition judgment related to eq (git-fixes).\n- RDMA/qedr: Fix error return code in qedr_iw_connect() (jsc#SLE-8215).\n- RDMA/srpt: Fix error return code in srpt_cm_req_recv() (git-fixes).\n- Revert \u0027arm64: vdso: Fix compilation with clang older than 8\u0027 (git-fixes).\n- Revert \u0027gdrom: fix a memory leak bug\u0027 (git-fixes).\n- Revert \u0027i3c master: fix missing destroy_workqueue() on error in i3c_master_register\u0027 (git-fixes).\n- Revert \u0027leds: lp5523: fix a missing check of return value of lp55xx_read\u0027 (git-fixes).\n- Revert 337f13046ff0 (\u0027futex: Allow FUTEX_CLOCK_REALTIME with FUTEX_WAIT op\u0027) (git-fixes).\n- SUNRPC in case of backlog, hand free slots directly to waiting task (bsc#1185428).\n- SUNRPC: More fixes for backlog congestion (bsc#1185428).\n- USB: Add LPM quirk for Lenovo ThinkPad USB-C Dock Gen2 Ethernet (git-fixes).\n- USB: Add reset-resume quirk for WD19\u0027s Realtek Hub (git-fixes).\n- USB: serial: pl2303: add support for PL2303HXN (bsc#1186320).\n- USB: serial: pl2303: fix line-speed handling on newer chips (bsc#1186320).\n- USB: serial: ti_usb_3410_5052: fix TIOCSSERIAL permission check (git-fixes).\n- USB: trancevibrator: fix control-request direction (git-fixes).\n- amdgpu: avoid incorrect %hu format string (git-fixes).\n- arm64/mm: Fix pfn_valid() for ZONE_DEVICE based memory (git-fixes).\n- arm64: Add missing ISB after invalidating TLB in __primary_switch (git-fixes).\n- arm64: avoid -Woverride-init warning (git-fixes).\n- arm64: kasan: fix page_alloc tagging with DEBUG_VIRTUAL (git-fixes).\n- arm64: kdump: update ppos when reading elfcorehdr (git-fixes).\n- arm64: kexec_file: fix memory leakage in create_dtb() when fdt_open_into() fails (git-fixes).\n- arm64: link with -z norelro for LLD or aarch64-elf (git-fixes).\n- arm64: link with -z norelro regardless of CONFIG_RELOCATABLE (git-fixes).\n- arm64: ptrace: Fix seccomp of traced syscall -1 (NO_SYSCALL) (git-fixes).\n- arm64: ptrace: Use NO_SYSCALL instead of -1 in syscall_trace_enter() (git-fixes).\n- arm64: vdso32: make vdso32 install conditional (git-fixes).\n- arm: mm: use __pfn_to_section() to get mem_section (git-fixes).\n- ata: ahci: Disable SXS for Hisilicon Kunpeng920 (git-fixes).\n- blk-iocost: ioc_pd_free() shouldn\u0027t assume irq disabled (git-fixes).\n- blk-mq: Swap two calls in blk_mq_exit_queue() (git-fixes).\n- block/genhd: use atomic_t for disk_event-\u003eblock (bsc#1185497).\n- block: Fix three kernel-doc warnings (git-fixes).\n- block: fix get_max_io_size() (git-fixes).\n- bnxt_en: Fix RX consumer index logic in the error path (git-fixes).\n- bnxt_en: fix ternary sign extension bug in bnxt_show_temp() (git-fixes).\n- bpf: Fix leakage of uninitialized bpf stack under speculation (bsc#1155518).\n- bpf: Fix masking negation logic upon negative dst register (bsc#1155518).\n- btrfs: fix race between transaction aborts and fsyncs leading to use-after-free (bsc#1186441).\n- btrfs: fix race when picking most recent mod log operation for an old root (bsc#1186439).\n- cdc-wdm: untangle a circular dependency between callback and softint (git-fixes).\n- cdrom: gdrom: deallocate struct gdrom_unit fields in remove_gdrom (git-fixes).\n- cdrom: gdrom: initialize global variable at init time (git-fixes).\n- ceph: do not clobber i_snap_caps on non-I_NEW inode (bsc#1186501).\n- ceph: fix inode leak on getattr error in __fh_to_dentry (bsc#1186501).\n- ceph: fix up error handling with snapdirs (bsc#1186501).\n- ceph: only check pool permissions for regular files (bsc#1186501).\n- cfg80211: scan: drop entry from hidden_list on overflow (git-fixes).\n- clk: socfpga: arria10: Fix memory leak of socfpga_clk on error return (git-fixes).\n- cpufreq: intel_pstate: Add Icelake servers support in no-HWP mode (bsc#1185758).\n- crypto: api - check for ERR pointers in crypto_destroy_tfm() (git-fixes).\n- crypto: mips/poly1305 - enable for all MIPS processors (git-fixes).\n- crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init (git-fixes).\n- crypto: qat - Fix a double free in adf_create_ring (git-fixes).\n- crypto: qat - do not release uninitialized resources (git-fixes).\n- crypto: qat - fix error path in adf_isr_resource_alloc() (git-fixes).\n- crypto: qat - fix unmap invalid dma address (git-fixes).\n- crypto: stm32/cryp - Fix PM reference leak on stm32-cryp.c (git-fixes).\n- crypto: stm32/hash - Fix PM reference leak on stm32-hash.c (git-fixes).\n- cxgb4: Fix unintentional sign extension issues (git-fixes).\n- dm: avoid filesystem lookup in dm_get_dev_t() (git-fixes).\n- dmaengine: dw-edma: Fix crash on loading/unloading driver (git-fixes).\n- docs: kernel-parameters: Add gpio_mockup_named_lines (git-fixes).\n- docs: kernel-parameters: Move gpio-mockup for alphabetic order (git-fixes).\n- drivers: hv: Fix whitespace errors (bsc#1185725).\n- drm/amd/display: Fix UBSAN warning for not a valid value for type \u0027_Bool\u0027 (git-fixes).\n- drm/amd/display: Fix two cursor duplication when using overlay (git-fixes).\n- drm/amd/display: Force vsync flip when reconfiguring MPCC (git-fixes).\n- drm/amd/display: Reject non-zero src_y and src_x for video planes (git-fixes).\n- drm/amd/display: fix dml prefetch validation (git-fixes).\n- drm/amd/display: fixed divide by zero kernel crash during dsc enablement (git-fixes).\n- drm/amdgpu : Fix asic reset regression issue introduce by 8f211fe8ac7c4f (git-fixes).\n- drm/amdgpu: disable 3DCGCG on picasso/raven1 to avoid compute hang (git-fixes).\n- drm/amdgpu: fix NULL pointer dereference (git-fixes).\n- drm/amdgpu: mask the xgmi number of hops reported from psp to kfd (git-fixes).\n- drm/amdkfd: Fix cat debugfs hang_hws file causes system crash bug (git-fixes).\n- drm/i915: Avoid div-by-zero on gen2 (git-fixes).\n- drm/meson: fix shutdown crash when component not probed (git-fixes).\n- drm/msm/mdp5: Configure PP_SYNC_HEIGHT to double the vtotal (git-fixes).\n- drm/msm/mdp5: Do not multiply vclk line count by 100 (git-fixes).\n- drm/radeon/dpm: Disable sclk switching on Oland when two 4K 60Hz monitors are connected (git-fixes).\n- drm/radeon: Avoid power table parsing memory leaks (git-fixes).\n- drm/radeon: Fix off-by-one power_state index heap overwrite (git-fixes).\n- drm/vkms: fix misuse of WARN_ON (git-fixes).\n- drm: Added orientation quirk for OneGX1 Pro (git-fixes).\n- ethernet:enic: Fix a use after free bug in enic_hard_start_xmit (git-fixes).\n- extcon: arizona: Fix some issues when HPDET IRQ fires after the jack has been unplugged (git-fixes).\n- extcon: arizona: Fix various races on driver unbind (git-fixes).\n- fbdev: zero-fill colormap in fbcmap.c (git-fixes).\n- firmware: arm_scpi: Prevent the ternary sign expansion bug (git-fixes).\n- fs/epoll: restore waking from ep_done_scan() (bsc#1183868).\n- ftrace: Handle commands when closing set_ftrace_filter file (git-fixes).\n- futex: Change utime parameter to be \u0027const ... *\u0027 (git-fixes).\n- futex: Do not apply time namespace adjustment on FUTEX_LOCK_PI (bsc#1164648).\n- futex: Get rid of the val2 conditional dance (git-fixes).\n- futex: Make syscall entry points less convoluted (git-fixes).\n- genirq/irqdomain: Do not try to free an interrupt that has no (git-fixes)\n- genirq: Disable interrupts for force threaded handlers (git-fixes)\n- genirq: Reduce irqdebug cacheline bouncing (bsc#1185703 ltc#192641).\n- gpio: xilinx: Correct kernel doc for xgpio_probe() (git-fixes).\n- gpiolib: acpi: Add quirk to ignore EC wakeups on Dell Venue 10 Pro 5055 (git-fixes).\n- hrtimer: Update softirq_expires_next correctly after (git-fixes)\n- hwmon: (occ) Fix poll rate limiting (git-fixes).\n- i2c: Add I2C_AQ_NO_REP_START adapter quirk (git-fixes).\n- i2c: bail out early when RDWR parameters are wrong (git-fixes).\n- i2c: i801: Do not generate an interrupt on bus reset (git-fixes).\n- i2c: s3c2410: fix possible NULL pointer deref on read message after write (git-fixes).\n- i2c: sh_mobile: Use new clock calculation formulas for RZ/G2E (git-fixes).\n- i40e: Fix PHY type identifiers for 2.5G and 5G adapters (git-fixes).\n- i40e: Fix use-after-free in i40e_client_subtask() (git-fixes).\n- i40e: fix broken XDP support (git-fixes).\n- i40e: fix the restart auto-negotiation after FEC modified (git-fixes).\n- ibmvfc: Avoid move login if fast fail is enabled (bsc#1185938 ltc#192043).\n- ibmvfc: Handle move login failure (bsc#1185938 ltc#192043).\n- ibmvfc: Reinit target retries (bsc#1185938 ltc#192043).\n- ibmvnic: remove default label from to_string switch (bsc#1152457 ltc#174432 git-fixes).\n- ics932s401: fix broken handling of errors when word reading fails (git-fixes).\n- iio: adc: ad7124: Fix missbalanced regulator enable / disable on error (git-fixes).\n- iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers (git-fixes).\n- iio: adc: ad7768-1: Fix too small buffer passed to iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: ad7793: Add missing error code in ad7793_setup() (git-fixes).\n- iio: gyro: fxas21002c: balance runtime power in error path (git-fixes).\n- iio: gyro: mpu3050: Fix reported temperature value (git-fixes).\n- iio: proximity: pulsedlight: Fix rumtime PM imbalance on error (git-fixes).\n- iio: tsl2583: Fix division by a zero lux_val (git-fixes).\n- intel_th: Consistency and off-by-one fix (git-fixes).\n- iommu/amd: Add support for map/unmap_resource (jsc#ECO-3482).\n- ipc/mqueue, msg, sem: Avoid relying on a stack reference past its expiry (bsc#1185988).\n- ipmi/watchdog: Stop watchdog timer when the current action is \u0027none\u0027 (bsc#1184855).\n- kernel-docs.spec.in: Build using an utf-8 locale. Sphinx cannot handle UTF-8 input in non-UTF-8 locale.\n- leds: lp5523: check return value of lp5xx_read and jump to cleanup code (git-fixes).\n- lpfc: Decouple port_template and vport_template (bsc#185032).\n- mac80211: clear the beacon\u0027s CRC after channel switch (git-fixes).\n- md-cluster: fix use-after-free issue when removing rdev (bsc#1184082).\n- md/raid1: properly indicate failure when ending a failed write request (bsc#1185680).\n- md: do not flush workqueue unconditionally in md_open (bsc#1184081).\n- md: factor out a mddev_find_locked helper from mddev_find (bsc#1184081).\n- md: md_open returns -EBUSY when entering racing area (bsc#1184081).\n- md: split mddev_find (bsc#1184081).\n- media: adv7604: fix possible use-after-free in adv76xx_remove() (git-fixes).\n- media: drivers: media: pci: sta2x11: fix Kconfig dependency on GPIOLIB (git-fixes).\n- media: dvb-usb: fix memory leak in dvb_usb_adapter_init (git-fixes).\n- media: em28xx: fix memory leak (git-fixes).\n- media: gspca/sq905.c: fix uninitialized variable (git-fixes).\n- media: i2c: adv7511-v4l2: fix possible use-after-free in adv7511_remove() (git-fixes).\n- media: i2c: adv7842: fix possible use-after-free in adv7842_remove() (git-fixes).\n- media: i2c: tda1997: Fix possible use-after-free in tda1997x_remove() (git-fixes).\n- media: imx: capture: Return -EPIPE from __capture_legacy_try_fmt() (git-fixes).\n- media: ite-cir: check for receive overflow (git-fixes).\n- media: media/saa7164: fix saa7164_encoder_register() memory leak bugs (git-fixes).\n- media: platform: sti: Fix runtime PM imbalance in regs_show (git-fixes).\n- media: tc358743: fix possible use-after-free in tc358743_remove() (git-fixes).\n- mfd: arizona: Fix rumtime PM imbalance on error (git-fixes).\n- misc/uss720: fix memory leak in uss720_probe (git-fixes).\n- mlxsw: spectrum_mr: Update egress RIF list before route\u0027s action (git-fixes).\n- mm: memcontrol: fix cpuhotplug statistics flushing (bsc#1185606).\n- mmc: block: Update ext_csd.cache_ctrl if it was written (git-fixes).\n- mmc: core: Do a power cycle when the CMD11 fails (git-fixes).\n- mmc: core: Set read only for SD cards with permanent write protect bit (git-fixes).\n- mmc: sdhci-pci-gli: increase 1.8V regulator wait (git-fixes).\n- mmc: sdhci-pci: Add PCI IDs for Intel LKF (git-fixes).\n- mmc: sdhci-pci: Fix initialization of some SD cards for Intel BYT-based controllers (git-fixes).\n- mmc: sdhci: Check for reset prior to DMA address unmap (git-fixes).\n- net, xdp: Update pkt_type if generic XDP changes unicast MAC (git-fixes).\n- net: enetc: fix link error again (git-fixes).\n- net: hns3: Fix for geneve tx checksum bug (git-fixes).\n- net: hns3: add check for HNS3_NIC_STATE_INITED in hns3_reset_notify_up_enet() (git-fixes).\n- net: hns3: clear unnecessary reset request in hclge_reset_rebuild (git-fixes).\n- net: hns3: disable phy loopback setting in hclge_mac_start_phy (git-fixes).\n- net: hns3: fix for vxlan gpe tx checksum bug (git-fixes).\n- net: hns3: fix incorrect configuration for igu_egu_hw_err (git-fixes).\n- net: hns3: initialize the message content in hclge_get_link_mode() (git-fixes).\n- net: hns3: use netif_tx_disable to stop the transmit queue (git-fixes).\n- net: thunderx: Fix unintentional sign extension issue (git-fixes).\n- net: usb: fix memory leak in smsc75xx_bind (git-fixes).\n- netdevice: Add missing IFF_PHONY_HEADROOM self-definition (git-fixes).\n- netfilter: conntrack: add new sysctl to disable RST check (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: avoid misleading \u0027invalid\u0027 in log message (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: improve RST handling when tuple is re-used (bsc#1183947 bsc#1185950).\n- nvme-core: add cancel tagset helpers (bsc#1183976).\n- nvme-fabrics: decode host pathing error for connect (bsc#1179827).\n- nvme-fc: check sgl supported by target (bsc#1179827).\n- nvme-fc: clear q_live at beginning of association teardown (bsc#1186479).\n- nvme-fc: return NVME_SC_HOST_ABORTED_CMD when a command has been aborted (bsc#1184259).\n- nvme-fc: set NVME_REQ_CANCELLED in nvme_fc_terminate_exchange() (bsc#1184259).\n- nvme-fc: short-circuit reconnect retries (bsc#1179827).\n- nvme-multipath: fix double initialization of ANA state (bsc#1178612, bsc#1184259).\n- nvme-multipath: reset bdev to ns head when failover (bsc#178378 bsc#1182999).\n- nvme-pci: Remove tag from process cq (git-fixes).\n- nvme-pci: Remove two-pass completions (git-fixes).\n- nvme-pci: Simplify nvme_poll_irqdisable (git-fixes).\n- nvme-pci: align io queue count with allocted nvme_queue in (git-fixes).\n- nvme-pci: avoid race between nvme_reap_pending_cqes() and nvme_poll() (git-fixes).\n- nvme-pci: dma read memory barrier for completions (git-fixes).\n- nvme-pci: fix \u0027slimmer CQ head update\u0027 (git-fixes).\n- nvme-pci: make sure write/poll_queues less or equal then cpu (git-fixes).\n- nvme-pci: remove last_sq_tail (git-fixes).\n- nvme-pci: remove volatile cqes (git-fixes).\n- nvme-pci: slimmer CQ head update (git-fixes).\n- nvme-pci: use simple suspend when a HMB is enabled (git-fixes).\n- nvme-tcp: Fix possible race of io_work and direct send (git-fixes).\n- nvme-tcp: Fix warning with CONFIG_DEBUG_PREEMPT (git-fixes).\n- nvme-tcp: add clean action for failed reconnection (bsc#1183976).\n- nvme-tcp: fix kconfig dependency warning when !CRYPTO (git-fixes).\n- nvme-tcp: fix misuse of __smp_processor_id with preemption (git-fixes).\n- nvme-tcp: fix possible hang waiting for icresp response (bsc#1179519).\n- nvme-tcp: use cancel tagset helper for tear down (bsc#1183976).\n- nvme: Fix NULL dereference for pci nvme controllers (bsc#1182378).\n- nvme: add \u0027kato\u0027 sysfs attribute (bsc#1179825).\n- nvme: add NVME_REQ_CANCELLED flag in nvme_cancel_request() (bsc#1184259).\n- nvme: define constants for identification values (git-fixes).\n- nvme: do not intialize hwmon for discovery controllers (bsc#1184259).\n- nvme: do not intialize hwmon for discovery controllers (git-fixes).\n- nvme: document nvme controller states (git-fixes).\n- nvme: explicitly update mpath disk capacity on revalidation (git-fixes).\n- nvme: expose reconnect_delay and ctrl_loss_tmo via sysfs (bsc#1182378).\n- nvme: fix controller instance leak (git-fixes).\n- nvme: fix deadlock in disconnect during scan_work and/or ana_work (git-fixes).\n- nvme: fix possible deadlock when I/O is blocked (git-fixes).\n- nvme: remove superfluous else in nvme_ctrl_loss_tmo_store (bsc#1182378).\n- nvme: retrigger ANA log update if group descriptor isn\u0027t found (git-fixes)\n- nvme: sanitize KATO setting (bsc#1179825).\n- nvme: simplify error logic in nvme_validate_ns() (bsc#1184259).\n- nvmet: fix a memory leak (git-fixes).\n- nvmet: seset ns-\u003efile when open fails (bsc#1183873).\n- nvmet: use new ana_log_size instead the old one (bsc#1184259).\n- nxp-i2c: restore includes for kABI (bsc#1185589).\n- nxp-nci: add NXP1002 id (bsc#1185589).\n- phy: phy-twl4030-usb: Fix possible use-after-free in twl4030_usb_remove() (git-fixes).\n- pinctrl: ingenic: Improve unreachable code generation (git-fixes).\n- pinctrl: samsung: use \u0027int\u0027 for register masks in Exynos (git-fixes).\n- platform/mellanox: mlxbf-tmfifo: Fix a memory barrier issue (git-fixes).\n- platform/x86: intel_pmc_core: Do not use global pmcdev in quirks (git-fixes).\n- platform/x86: thinkpad_acpi: Correct thermal sensor allocation (git-fixes).\n- posix-timers: Preserve return value in clock_adjtime32() (git-fixes)\n- power: supply: Use IRQF_ONESHOT (git-fixes).\n- power: supply: generic-adc-battery: fix possible use-after-free in gab_remove() (git-fixes).\n- power: supply: s3c_adc_battery: fix possible use-after-free in s3c_adc_bat_remove() (git-fixes).\n- powerpc/64s: Fix crashes when toggling entry flush barrier (bsc#1177666 git-fixes).\n- powerpc/64s: Fix crashes when toggling stf barrier (bsc#1087082 git-fixes).\n- qtnfmac: Fix possible buffer overflow in qtnf_event_handle_external_auth (git-fixes).\n- rtc: pcf2127: handle timestamp interrupts (bsc#1185495).\n- s390/dasd: fix hanging DASD driver unbind (bsc#1183932 LTC#192153).\n- s390/entry: save the caller of psw_idle (bsc#1185677).\n- s390/kdump: fix out-of-memory with PCI (bsc#1182257 LTC#191375).\n- sched/eas: Do not update misfit status if the task is pinned (git-fixes)\n- sched/fair: Avoid stale CPU util_est value for schedutil in (git-fixes)\n- sched/fair: Fix unfairness caused by missing load decay (git-fixes)\n- scripts/git_sort/git_sort.py: add bpf git repo\n- scsi: core: Run queue in case of I/O resource contention failure (bsc#1186416).\n- scsi: fnic: Kill \u0027exclude_id\u0027 argument to fnic_cleanup_io() (bsc#1179851).\n- scsi: libfc: Avoid invoking response handler twice if ep is already completed (bsc#1186573).\n- scsi: lpfc: Add a option to enable interlocked ABTS before job completion (bsc#1186451).\n- scsi: lpfc: Add ndlp kref accounting for resume RPI path (bsc#1186451).\n- scsi: lpfc: Fix \u0027Unexpected timeout\u0027 error in direct attach topology (bsc#1186451).\n- scsi: lpfc: Fix Node recovery when driver is handling simultaneous PLOGIs (bsc#1186451).\n- scsi: lpfc: Fix bad memory access during VPD DUMP mailbox command (bsc#1186451).\n- scsi: lpfc: Fix crash when lpfc_sli4_hba_setup() fails to initialize the SGLs (bsc#1186451).\n- scsi: lpfc: Fix node handling for Fabric Controller and Domain Controller (bsc#1186451).\n- scsi: lpfc: Fix non-optimized ERSP handling (bsc#1186451).\n- scsi: lpfc: Fix unreleased RPIs when NPIV ports are created (bsc#1186451).\n- scsi: lpfc: Ignore GID-FT response that may be received after a link flip (bsc#1186451).\n- scsi: lpfc: Reregister FPIN types if ELS_RDF is received from fabric controller (bsc#1186451).\n- scsi: lpfc: Update lpfc version to 12.8.0.10 (bsc#1186451).\n- sctp: delay auto_asconf init until binding the first addr (\u0026lt;cover.1620748346.git.mkubecek@suse.cz\u003e).\n- serial: core: fix suspicious security_locked_down() call (git-fixes).\n- serial: core: return early on unsupported ioctls (git-fixes).\n- serial: sh-sci: Fix off-by-one error in FIFO threshold register setting (git-fixes).\n- serial: stm32: fix incorrect characters on console (git-fixes).\n- serial: stm32: fix tx_empty condition (git-fixes).\n- serial: tegra: Fix a mask operation that is always true (git-fixes).\n- smc: disallow TCP_ULP in smc_setsockopt() (git-fixes).\n- spi: ath79: always call chipselect function (git-fixes).\n- spi: ath79: remove spi-master setup and cleanup assignment (git-fixes).\n- spi: dln2: Fix reference leak to master (git-fixes).\n- spi: omap-100k: Fix reference leak to master (git-fixes).\n- spi: qup: fix PM reference leak in spi_qup_remove() (git-fixes).\n- spi: spi-fsl-dspi: Fix a resource leak in an error handling path (git-fixes).\n- staging: emxx_udc: fix loop in _nbu2ss_nuke() (git-fixes).\n- staging: iio: cdc: ad7746: avoid overwrite of num_channels (git-fixes).\n- tcp: fix to update snd_wl1 in bulk receiver fast path (\u0026lt;cover.1620748346.git.mkubecek@suse.cz\u003e).\n- thermal/drivers/ti-soc-thermal/bandgap Remove unused variable \u0027val\u0027 (git-fixes).\n- thunderbolt: dma_port: Fix NVM read buffer bounds and offset issue (git-fixes).\n- tracing: Map all PIDs to command lines (git-fixes).\n- tty: amiserial: fix TIOCSSERIAL permission check (git-fixes).\n- tty: fix memory leak in vc_deallocate (git-fixes).\n- tty: moxa: fix TIOCSSERIAL jiffies conversions (git-fixes).\n- tty: moxa: fix TIOCSSERIAL permission check (git-fixes).\n- uio: uio_hv_generic: use devm_kzalloc() for private data alloc (git-fixes).\n- uio_hv_generic: Fix a memory leak in error handling paths (git-fixes).\n- uio_hv_generic: Fix another memory leak in error handling paths (git-fixes).\n- uio_hv_generic: add missed sysfs_remove_bin_file (git-fixes).\n- usb: core: hub: Fix PM reference leak in usb_port_resume() (git-fixes).\n- usb: core: hub: fix race condition about TRSMRCY of resume (git-fixes).\n- usb: dwc2: Fix gadget DMA unmap direction (git-fixes).\n- usb: dwc3: gadget: Enable suspend events (git-fixes).\n- usb: dwc3: gadget: Return success always for kick transfer in ep queue (git-fixes).\n- usb: dwc3: omap: improve extcon initialization (git-fixes).\n- usb: dwc3: pci: Enable usb2-gadget-lpm-disable for Intel Merrifield (git-fixes).\n- usb: fotg210-hcd: Fix an error message (git-fixes).\n- usb: gadget/function/f_fs string table fix for multiple languages (git-fixes).\n- usb: gadget: dummy_hcd: fix gpf in gadget_setup (git-fixes).\n- usb: gadget: f_uac1: validate input parameters (git-fixes).\n- usb: gadget: f_uac2: validate input parameters (git-fixes).\n- usb: gadget: udc: renesas_usb3: Fix a race in usb3_start_pipen() (git-fixes).\n- usb: gadget: uvc: add bInterval checking for HS mode (git-fixes).\n- usb: musb: fix PM reference leak in musb_irq_work() (git-fixes).\n- usb: sl811-hcd: improve misleading indentation (git-fixes).\n- usb: webcam: Invalid size of Processing Unit Descriptor (git-fixes).\n- usb: xhci: Fix port minor revision (git-fixes).\n- usb: xhci: Increase timeout for HC halt (git-fixes).\n- vgacon: Record video mode changes with VT_RESIZEX (git-fixes).\n- video: hyperv_fb: Add ratelimit on error message (bsc#1185725).\n- vrf: fix a comment about loopback device (git-fixes).\n- watchdog/softlockup: Remove obsolete check of last reported task (bsc#1185982).\n- watchdog/softlockup: report the overall time of softlockups (bsc#1185982).\n- watchdog: explicitly update timestamp when reporting softlockup (bsc#1185982).\n- watchdog: rename __touch_watchdog() to a better descriptive name (bsc#1185982).\n- whitespace cleanup\n- wl3501_cs: Fix out-of-bounds warnings in wl3501_mgmt_join (git-fixes).\n- wl3501_cs: Fix out-of-bounds warnings in wl3501_send_pkt (git-fixes).\n- workqueue: Minor follow-ups to the rescuer destruction change (bsc#1185911).\n- workqueue: more destroy_workqueue() fixes (bsc#1185911).\n- x86/cpu: Initialize MSR_TSC_AUX if RDTSCP *or* RDPID is supported (bsc#1152489).\n- xhci: Do not use GFP_KERNEL in (potentially) atomic context (git-fixes).\n- xhci: check control context is valid before dereferencing it (git-fixes).\n- xhci: fix potential array out of bounds with several interrupters (git-fixes).\n- xsk: Respect device\u0027s headroom and tailroom on generic xmit path (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-1890,SUSE-SLE-Module-Basesystem-15-SP2-2021-1890,SUSE-SLE-Module-Development-Tools-15-SP2-2021-1890,SUSE-SLE-Module-Legacy-15-SP2-2021-1890,SUSE-SLE-Module-Live-Patching-15-SP2-2021-1890,SUSE-SLE-Product-HA-15-SP2-2021-1890,SUSE-SLE-Product-WE-15-SP2-2021-1890,SUSE-SUSE-MicroOS-5.0-2021-1890",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_1890-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:1890-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20211890-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:1890-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/008947.html"
},
{
"category": "self",
"summary": "SUSE Bug 1087082",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "self",
"summary": "SUSE Bug 1133021",
"url": "https://bugzilla.suse.com/1133021"
},
{
"category": "self",
"summary": "SUSE Bug 1152457",
"url": "https://bugzilla.suse.com/1152457"
},
{
"category": "self",
"summary": "SUSE Bug 1152489",
"url": "https://bugzilla.suse.com/1152489"
},
{
"category": "self",
"summary": "SUSE Bug 1155518",
"url": "https://bugzilla.suse.com/1155518"
},
{
"category": "self",
"summary": "SUSE Bug 1156395",
"url": "https://bugzilla.suse.com/1156395"
},
{
"category": "self",
"summary": "SUSE Bug 1164648",
"url": "https://bugzilla.suse.com/1164648"
},
{
"category": "self",
"summary": "SUSE Bug 1177666",
"url": "https://bugzilla.suse.com/1177666"
},
{
"category": "self",
"summary": "SUSE Bug 1178378",
"url": "https://bugzilla.suse.com/1178378"
},
{
"category": "self",
"summary": "SUSE Bug 1178418",
"url": "https://bugzilla.suse.com/1178418"
},
{
"category": "self",
"summary": "SUSE Bug 1178612",
"url": "https://bugzilla.suse.com/1178612"
},
{
"category": "self",
"summary": "SUSE Bug 1179519",
"url": "https://bugzilla.suse.com/1179519"
},
{
"category": "self",
"summary": "SUSE Bug 1179825",
"url": "https://bugzilla.suse.com/1179825"
},
{
"category": "self",
"summary": "SUSE Bug 1179827",
"url": "https://bugzilla.suse.com/1179827"
},
{
"category": "self",
"summary": "SUSE Bug 1179851",
"url": "https://bugzilla.suse.com/1179851"
},
{
"category": "self",
"summary": "SUSE Bug 1182257",
"url": "https://bugzilla.suse.com/1182257"
},
{
"category": "self",
"summary": "SUSE Bug 1182378",
"url": "https://bugzilla.suse.com/1182378"
},
{
"category": "self",
"summary": "SUSE Bug 1182999",
"url": "https://bugzilla.suse.com/1182999"
},
{
"category": "self",
"summary": "SUSE Bug 1183346",
"url": "https://bugzilla.suse.com/1183346"
},
{
"category": "self",
"summary": "SUSE Bug 1183868",
"url": "https://bugzilla.suse.com/1183868"
},
{
"category": "self",
"summary": "SUSE Bug 1183873",
"url": "https://bugzilla.suse.com/1183873"
},
{
"category": "self",
"summary": "SUSE Bug 1183932",
"url": "https://bugzilla.suse.com/1183932"
},
{
"category": "self",
"summary": "SUSE Bug 1183947",
"url": "https://bugzilla.suse.com/1183947"
},
{
"category": "self",
"summary": "SUSE Bug 1183976",
"url": "https://bugzilla.suse.com/1183976"
},
{
"category": "self",
"summary": "SUSE Bug 1184081",
"url": "https://bugzilla.suse.com/1184081"
},
{
"category": "self",
"summary": "SUSE Bug 1184082",
"url": "https://bugzilla.suse.com/1184082"
},
{
"category": "self",
"summary": "SUSE Bug 1184259",
"url": "https://bugzilla.suse.com/1184259"
},
{
"category": "self",
"summary": "SUSE Bug 1184611",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "self",
"summary": "SUSE Bug 1184855",
"url": "https://bugzilla.suse.com/1184855"
},
{
"category": "self",
"summary": "SUSE Bug 1185428",
"url": "https://bugzilla.suse.com/1185428"
},
{
"category": "self",
"summary": "SUSE Bug 1185495",
"url": "https://bugzilla.suse.com/1185495"
},
{
"category": "self",
"summary": "SUSE Bug 1185497",
"url": "https://bugzilla.suse.com/1185497"
},
{
"category": "self",
"summary": "SUSE Bug 1185589",
"url": "https://bugzilla.suse.com/1185589"
},
{
"category": "self",
"summary": "SUSE Bug 1185606",
"url": "https://bugzilla.suse.com/1185606"
},
{
"category": "self",
"summary": "SUSE Bug 1185642",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "self",
"summary": "SUSE Bug 1185645",
"url": "https://bugzilla.suse.com/1185645"
},
{
"category": "self",
"summary": "SUSE Bug 1185677",
"url": "https://bugzilla.suse.com/1185677"
},
{
"category": "self",
"summary": "SUSE Bug 1185680",
"url": "https://bugzilla.suse.com/1185680"
},
{
"category": "self",
"summary": "SUSE Bug 1185703",
"url": "https://bugzilla.suse.com/1185703"
},
{
"category": "self",
"summary": "SUSE Bug 1185725",
"url": "https://bugzilla.suse.com/1185725"
},
{
"category": "self",
"summary": "SUSE Bug 1185758",
"url": "https://bugzilla.suse.com/1185758"
},
{
"category": "self",
"summary": "SUSE Bug 1185859",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "self",
"summary": "SUSE Bug 1185860",
"url": "https://bugzilla.suse.com/1185860"
},
{
"category": "self",
"summary": "SUSE Bug 1185861",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "self",
"summary": "SUSE Bug 1185862",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "self",
"summary": "SUSE Bug 1185863",
"url": "https://bugzilla.suse.com/1185863"
},
{
"category": "self",
"summary": "SUSE Bug 1185898",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "self",
"summary": "SUSE Bug 1185899",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "self",
"summary": "SUSE Bug 1185911",
"url": "https://bugzilla.suse.com/1185911"
},
{
"category": "self",
"summary": "SUSE Bug 1185938",
"url": "https://bugzilla.suse.com/1185938"
},
{
"category": "self",
"summary": "SUSE Bug 1185950",
"url": "https://bugzilla.suse.com/1185950"
},
{
"category": "self",
"summary": "SUSE Bug 1185982",
"url": "https://bugzilla.suse.com/1185982"
},
{
"category": "self",
"summary": "SUSE Bug 1185987",
"url": "https://bugzilla.suse.com/1185987"
},
{
"category": "self",
"summary": "SUSE Bug 1185988",
"url": "https://bugzilla.suse.com/1185988"
},
{
"category": "self",
"summary": "SUSE Bug 1186060",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "self",
"summary": "SUSE Bug 1186061",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "self",
"summary": "SUSE Bug 1186062",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "self",
"summary": "SUSE Bug 1186111",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "self",
"summary": "SUSE Bug 1186285",
"url": "https://bugzilla.suse.com/1186285"
},
{
"category": "self",
"summary": "SUSE Bug 1186320",
"url": "https://bugzilla.suse.com/1186320"
},
{
"category": "self",
"summary": "SUSE Bug 1186390",
"url": "https://bugzilla.suse.com/1186390"
},
{
"category": "self",
"summary": "SUSE Bug 1186416",
"url": "https://bugzilla.suse.com/1186416"
},
{
"category": "self",
"summary": "SUSE Bug 1186439",
"url": "https://bugzilla.suse.com/1186439"
},
{
"category": "self",
"summary": "SUSE Bug 1186441",
"url": "https://bugzilla.suse.com/1186441"
},
{
"category": "self",
"summary": "SUSE Bug 1186451",
"url": "https://bugzilla.suse.com/1186451"
},
{
"category": "self",
"summary": "SUSE Bug 1186460",
"url": "https://bugzilla.suse.com/1186460"
},
{
"category": "self",
"summary": "SUSE Bug 1186479",
"url": "https://bugzilla.suse.com/1186479"
},
{
"category": "self",
"summary": "SUSE Bug 1186484",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "self",
"summary": "SUSE Bug 1186498",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "self",
"summary": "SUSE Bug 1186501",
"url": "https://bugzilla.suse.com/1186501"
},
{
"category": "self",
"summary": "SUSE Bug 1186573",
"url": "https://bugzilla.suse.com/1186573"
},
{
"category": "self",
"summary": "SUSE Bug 1186681",
"url": "https://bugzilla.suse.com/1186681"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24586 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24587 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24587/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24588 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26139 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26141 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26145 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26145/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26147 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23134 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32399 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33034 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33034/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33200 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3491 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3491/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-06-08T13:08:52Z",
"generator": {
"date": "2021-06-08T13:08:52Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:1890-1",
"initial_release_date": "2021-06-08T13:08:52Z",
"revision_history": [
{
"date": "2021-06-08T13:08:52Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"product_id": "cluster-md-kmp-default-5.3.18-24.67.3.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-24.67.4.aarch64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-24.67.4.aarch64",
"product_id": "cluster-md-kmp-preempt-5.3.18-24.67.4.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-24.67.3.aarch64",
"product": {
"name": "dlm-kmp-default-5.3.18-24.67.3.aarch64",
"product_id": "dlm-kmp-default-5.3.18-24.67.3.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-24.67.4.aarch64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-24.67.4.aarch64",
"product_id": "dlm-kmp-preempt-5.3.18-24.67.4.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"product": {
"name": "gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"product_id": "gfs2-kmp-default-5.3.18-24.67.3.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-24.67.4.aarch64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-24.67.4.aarch64",
"product_id": "gfs2-kmp-preempt-5.3.18-24.67.4.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-24.67.3.aarch64",
"product": {
"name": "kernel-default-5.3.18-24.67.3.aarch64",
"product_id": "kernel-default-5.3.18-24.67.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"product": {
"name": "kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"product_id": "kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-24.67.3.9.30.2.aarch64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-24.67.3.9.30.2.aarch64",
"product_id": "kernel-default-base-rebuild-5.3.18-24.67.3.9.30.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-24.67.3.aarch64",
"product": {
"name": "kernel-default-devel-5.3.18-24.67.3.aarch64",
"product_id": "kernel-default-devel-5.3.18-24.67.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-24.67.3.aarch64",
"product": {
"name": "kernel-default-extra-5.3.18-24.67.3.aarch64",
"product_id": "kernel-default-extra-5.3.18-24.67.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-24.67.3.aarch64",
"product": {
"name": "kernel-default-livepatch-5.3.18-24.67.3.aarch64",
"product_id": "kernel-default-livepatch-5.3.18-24.67.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-24.67.3.aarch64",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-24.67.3.aarch64",
"product_id": "kernel-default-livepatch-devel-5.3.18-24.67.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-24.67.2.aarch64",
"product": {
"name": "kernel-obs-build-5.3.18-24.67.2.aarch64",
"product_id": "kernel-obs-build-5.3.18-24.67.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-24.67.1.aarch64",
"product": {
"name": "kernel-obs-qa-5.3.18-24.67.1.aarch64",
"product_id": "kernel-obs-qa-5.3.18-24.67.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-24.67.4.aarch64",
"product": {
"name": "kernel-preempt-5.3.18-24.67.4.aarch64",
"product_id": "kernel-preempt-5.3.18-24.67.4.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"product": {
"name": "kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"product_id": "kernel-preempt-devel-5.3.18-24.67.4.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-24.67.4.aarch64",
"product": {
"name": "kernel-preempt-extra-5.3.18-24.67.4.aarch64",
"product_id": "kernel-preempt-extra-5.3.18-24.67.4.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-livepatch-devel-5.3.18-24.67.4.aarch64",
"product": {
"name": "kernel-preempt-livepatch-devel-5.3.18-24.67.4.aarch64",
"product_id": "kernel-preempt-livepatch-devel-5.3.18-24.67.4.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-24.67.1.aarch64",
"product": {
"name": "kernel-syms-5.3.18-24.67.1.aarch64",
"product_id": "kernel-syms-5.3.18-24.67.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-24.67.3.aarch64",
"product": {
"name": "kselftests-kmp-default-5.3.18-24.67.3.aarch64",
"product_id": "kselftests-kmp-default-5.3.18-24.67.3.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-24.67.4.aarch64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-24.67.4.aarch64",
"product_id": "kselftests-kmp-preempt-5.3.18-24.67.4.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"product_id": "ocfs2-kmp-default-5.3.18-24.67.3.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-24.67.4.aarch64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-24.67.4.aarch64",
"product_id": "ocfs2-kmp-preempt-5.3.18-24.67.4.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"product_id": "reiserfs-kmp-default-5.3.18-24.67.3.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-24.67.4.aarch64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-24.67.4.aarch64",
"product_id": "reiserfs-kmp-preempt-5.3.18-24.67.4.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-5.3.18-24.67.2.noarch",
"product": {
"name": "kernel-devel-5.3.18-24.67.2.noarch",
"product_id": "kernel-devel-5.3.18-24.67.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-5.3.18-24.67.3.noarch",
"product": {
"name": "kernel-docs-5.3.18-24.67.3.noarch",
"product_id": "kernel-docs-5.3.18-24.67.3.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-5.3.18-24.67.3.noarch",
"product": {
"name": "kernel-docs-html-5.3.18-24.67.3.noarch",
"product_id": "kernel-docs-html-5.3.18-24.67.3.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-5.3.18-24.67.2.noarch",
"product": {
"name": "kernel-macros-5.3.18-24.67.2.noarch",
"product_id": "kernel-macros-5.3.18-24.67.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-5.3.18-24.67.2.noarch",
"product": {
"name": "kernel-source-5.3.18-24.67.2.noarch",
"product_id": "kernel-source-5.3.18-24.67.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-5.3.18-24.67.2.noarch",
"product": {
"name": "kernel-source-vanilla-5.3.18-24.67.2.noarch",
"product_id": "kernel-source-vanilla-5.3.18-24.67.2.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"product": {
"name": "cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"product_id": "cluster-md-kmp-default-5.3.18-24.67.3.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"product": {
"name": "dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"product_id": "dlm-kmp-default-5.3.18-24.67.3.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"product": {
"name": "gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"product_id": "gfs2-kmp-default-5.3.18-24.67.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.3.18-24.67.3.ppc64le",
"product": {
"name": "kernel-debug-5.3.18-24.67.3.ppc64le",
"product_id": "kernel-debug-5.3.18-24.67.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-24.67.3.ppc64le",
"product": {
"name": "kernel-debug-devel-5.3.18-24.67.3.ppc64le",
"product_id": "kernel-debug-devel-5.3.18-24.67.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.3.18-24.67.3.ppc64le",
"product": {
"name": "kernel-debug-livepatch-devel-5.3.18-24.67.3.ppc64le",
"product_id": "kernel-debug-livepatch-devel-5.3.18-24.67.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-24.67.3.ppc64le",
"product": {
"name": "kernel-default-5.3.18-24.67.3.ppc64le",
"product_id": "kernel-default-5.3.18-24.67.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"product": {
"name": "kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"product_id": "kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-24.67.3.9.30.2.ppc64le",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-24.67.3.9.30.2.ppc64le",
"product_id": "kernel-default-base-rebuild-5.3.18-24.67.3.9.30.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-24.67.3.ppc64le",
"product": {
"name": "kernel-default-devel-5.3.18-24.67.3.ppc64le",
"product_id": "kernel-default-devel-5.3.18-24.67.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-24.67.3.ppc64le",
"product": {
"name": "kernel-default-extra-5.3.18-24.67.3.ppc64le",
"product_id": "kernel-default-extra-5.3.18-24.67.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"product": {
"name": "kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"product_id": "kernel-default-livepatch-5.3.18-24.67.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"product_id": "kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-24.67.3.ppc64le",
"product": {
"name": "kernel-kvmsmall-5.3.18-24.67.3.ppc64le",
"product_id": "kernel-kvmsmall-5.3.18-24.67.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-24.67.3.ppc64le",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-24.67.3.ppc64le",
"product_id": "kernel-kvmsmall-devel-5.3.18-24.67.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-24.67.3.ppc64le",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-24.67.3.ppc64le",
"product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-24.67.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-24.67.2.ppc64le",
"product": {
"name": "kernel-obs-build-5.3.18-24.67.2.ppc64le",
"product_id": "kernel-obs-build-5.3.18-24.67.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-24.67.1.ppc64le",
"product": {
"name": "kernel-obs-qa-5.3.18-24.67.1.ppc64le",
"product_id": "kernel-obs-qa-5.3.18-24.67.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-24.67.1.ppc64le",
"product": {
"name": "kernel-syms-5.3.18-24.67.1.ppc64le",
"product_id": "kernel-syms-5.3.18-24.67.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-24.67.3.ppc64le",
"product": {
"name": "kselftests-kmp-default-5.3.18-24.67.3.ppc64le",
"product_id": "kselftests-kmp-default-5.3.18-24.67.3.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"product": {
"name": "ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"product_id": "ocfs2-kmp-default-5.3.18-24.67.3.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"product": {
"name": "reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"product_id": "reiserfs-kmp-default-5.3.18-24.67.3.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"product": {
"name": "cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"product_id": "cluster-md-kmp-default-5.3.18-24.67.3.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-24.67.3.s390x",
"product": {
"name": "dlm-kmp-default-5.3.18-24.67.3.s390x",
"product_id": "dlm-kmp-default-5.3.18-24.67.3.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-24.67.3.s390x",
"product": {
"name": "gfs2-kmp-default-5.3.18-24.67.3.s390x",
"product_id": "gfs2-kmp-default-5.3.18-24.67.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-24.67.3.s390x",
"product": {
"name": "kernel-default-5.3.18-24.67.3.s390x",
"product_id": "kernel-default-5.3.18-24.67.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"product": {
"name": "kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"product_id": "kernel-default-base-5.3.18-24.67.3.9.30.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-24.67.3.9.30.2.s390x",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-24.67.3.9.30.2.s390x",
"product_id": "kernel-default-base-rebuild-5.3.18-24.67.3.9.30.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-24.67.3.s390x",
"product": {
"name": "kernel-default-devel-5.3.18-24.67.3.s390x",
"product_id": "kernel-default-devel-5.3.18-24.67.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-24.67.3.s390x",
"product": {
"name": "kernel-default-extra-5.3.18-24.67.3.s390x",
"product_id": "kernel-default-extra-5.3.18-24.67.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-24.67.3.s390x",
"product": {
"name": "kernel-default-livepatch-5.3.18-24.67.3.s390x",
"product_id": "kernel-default-livepatch-5.3.18-24.67.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"product_id": "kernel-default-livepatch-devel-5.3.18-24.67.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"product_id": "kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-24.67.2.s390x",
"product": {
"name": "kernel-obs-build-5.3.18-24.67.2.s390x",
"product_id": "kernel-obs-build-5.3.18-24.67.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-24.67.1.s390x",
"product": {
"name": "kernel-obs-qa-5.3.18-24.67.1.s390x",
"product_id": "kernel-obs-qa-5.3.18-24.67.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-24.67.1.s390x",
"product": {
"name": "kernel-syms-5.3.18-24.67.1.s390x",
"product_id": "kernel-syms-5.3.18-24.67.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-5.3.18-24.67.3.s390x",
"product": {
"name": "kernel-zfcpdump-5.3.18-24.67.3.s390x",
"product_id": "kernel-zfcpdump-5.3.18-24.67.3.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-24.67.3.s390x",
"product": {
"name": "kselftests-kmp-default-5.3.18-24.67.3.s390x",
"product_id": "kselftests-kmp-default-5.3.18-24.67.3.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"product": {
"name": "ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"product_id": "ocfs2-kmp-default-5.3.18-24.67.3.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"product": {
"name": "reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"product_id": "reiserfs-kmp-default-5.3.18-24.67.3.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"product_id": "cluster-md-kmp-default-5.3.18-24.67.3.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-24.67.4.x86_64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-24.67.4.x86_64",
"product_id": "cluster-md-kmp-preempt-5.3.18-24.67.4.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-24.67.3.x86_64",
"product": {
"name": "dlm-kmp-default-5.3.18-24.67.3.x86_64",
"product_id": "dlm-kmp-default-5.3.18-24.67.3.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-24.67.4.x86_64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-24.67.4.x86_64",
"product_id": "dlm-kmp-preempt-5.3.18-24.67.4.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"product": {
"name": "gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"product_id": "gfs2-kmp-default-5.3.18-24.67.3.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-24.67.4.x86_64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-24.67.4.x86_64",
"product_id": "gfs2-kmp-preempt-5.3.18-24.67.4.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.3.18-24.67.3.x86_64",
"product": {
"name": "kernel-debug-5.3.18-24.67.3.x86_64",
"product_id": "kernel-debug-5.3.18-24.67.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-24.67.3.x86_64",
"product": {
"name": "kernel-debug-devel-5.3.18-24.67.3.x86_64",
"product_id": "kernel-debug-devel-5.3.18-24.67.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.3.18-24.67.3.x86_64",
"product": {
"name": "kernel-debug-livepatch-devel-5.3.18-24.67.3.x86_64",
"product_id": "kernel-debug-livepatch-devel-5.3.18-24.67.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-24.67.3.x86_64",
"product": {
"name": "kernel-default-5.3.18-24.67.3.x86_64",
"product_id": "kernel-default-5.3.18-24.67.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"product": {
"name": "kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"product_id": "kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-24.67.3.9.30.2.x86_64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-24.67.3.9.30.2.x86_64",
"product_id": "kernel-default-base-rebuild-5.3.18-24.67.3.9.30.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-24.67.3.x86_64",
"product": {
"name": "kernel-default-devel-5.3.18-24.67.3.x86_64",
"product_id": "kernel-default-devel-5.3.18-24.67.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-24.67.3.x86_64",
"product": {
"name": "kernel-default-extra-5.3.18-24.67.3.x86_64",
"product_id": "kernel-default-extra-5.3.18-24.67.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"product": {
"name": "kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"product_id": "kernel-default-livepatch-5.3.18-24.67.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"product_id": "kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-24.67.3.x86_64",
"product": {
"name": "kernel-kvmsmall-5.3.18-24.67.3.x86_64",
"product_id": "kernel-kvmsmall-5.3.18-24.67.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-24.67.3.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-24.67.3.x86_64",
"product_id": "kernel-kvmsmall-devel-5.3.18-24.67.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-24.67.3.x86_64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-24.67.3.x86_64",
"product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-24.67.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_67-preempt-1-5.3.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_67-preempt-1-5.3.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_67-preempt-1-5.3.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-24.67.2.x86_64",
"product": {
"name": "kernel-obs-build-5.3.18-24.67.2.x86_64",
"product_id": "kernel-obs-build-5.3.18-24.67.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-24.67.1.x86_64",
"product": {
"name": "kernel-obs-qa-5.3.18-24.67.1.x86_64",
"product_id": "kernel-obs-qa-5.3.18-24.67.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-24.67.4.x86_64",
"product": {
"name": "kernel-preempt-5.3.18-24.67.4.x86_64",
"product_id": "kernel-preempt-5.3.18-24.67.4.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"product": {
"name": "kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"product_id": "kernel-preempt-devel-5.3.18-24.67.4.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-24.67.4.x86_64",
"product": {
"name": "kernel-preempt-extra-5.3.18-24.67.4.x86_64",
"product_id": "kernel-preempt-extra-5.3.18-24.67.4.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-livepatch-devel-5.3.18-24.67.4.x86_64",
"product": {
"name": "kernel-preempt-livepatch-devel-5.3.18-24.67.4.x86_64",
"product_id": "kernel-preempt-livepatch-devel-5.3.18-24.67.4.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-24.67.1.x86_64",
"product": {
"name": "kernel-syms-5.3.18-24.67.1.x86_64",
"product_id": "kernel-syms-5.3.18-24.67.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-24.67.3.x86_64",
"product": {
"name": "kselftests-kmp-default-5.3.18-24.67.3.x86_64",
"product_id": "kselftests-kmp-default-5.3.18-24.67.3.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-24.67.4.x86_64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-24.67.4.x86_64",
"product_id": "kselftests-kmp-preempt-5.3.18-24.67.4.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"product_id": "ocfs2-kmp-default-5.3.18-24.67.3.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-24.67.4.x86_64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-24.67.4.x86_64",
"product_id": "ocfs2-kmp-preempt-5.3.18-24.67.4.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"product_id": "reiserfs-kmp-default-5.3.18-24.67.3.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-24.67.4.x86_64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-24.67.4.x86_64",
"product_id": "reiserfs-kmp-preempt-5.3.18-24.67.4.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Legacy 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Module for Legacy 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-legacy:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15 SP2",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 15 SP2",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.0",
"product": {
"name": "SUSE Linux Enterprise Micro 5.0",
"product_id": "SUSE Linux Enterprise Micro 5.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-24.67.3.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64"
},
"product_reference": "kernel-default-5.3.18-24.67.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-24.67.3.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le"
},
"product_reference": "kernel-default-5.3.18-24.67.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-24.67.3.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x"
},
"product_reference": "kernel-default-5.3.18-24.67.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-24.67.3.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64"
},
"product_reference": "kernel-default-5.3.18-24.67.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le"
},
"product_reference": "kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-24.67.3.9.30.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x"
},
"product_reference": "kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-24.67.3.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64"
},
"product_reference": "kernel-default-devel-5.3.18-24.67.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-24.67.3.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le"
},
"product_reference": "kernel-default-devel-5.3.18-24.67.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-24.67.3.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x"
},
"product_reference": "kernel-default-devel-5.3.18-24.67.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-24.67.3.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-24.67.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-24.67.2.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch"
},
"product_reference": "kernel-devel-5.3.18-24.67.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-24.67.2.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch"
},
"product_reference": "kernel-macros-5.3.18-24.67.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-24.67.4.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64"
},
"product_reference": "kernel-preempt-5.3.18-24.67.4.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-24.67.4.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-24.67.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-24.67.3.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch"
},
"product_reference": "kernel-docs-5.3.18-24.67.3.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-24.67.2.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64"
},
"product_reference": "kernel-obs-build-5.3.18-24.67.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-24.67.2.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le"
},
"product_reference": "kernel-obs-build-5.3.18-24.67.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-24.67.2.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x"
},
"product_reference": "kernel-obs-build-5.3.18-24.67.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-24.67.2.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-24.67.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-24.67.4.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64"
},
"product_reference": "kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-24.67.4.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-24.67.2.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch"
},
"product_reference": "kernel-source-5.3.18-24.67.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-24.67.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64"
},
"product_reference": "kernel-syms-5.3.18-24.67.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-24.67.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le"
},
"product_reference": "kernel-syms-5.3.18-24.67.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-24.67.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x"
},
"product_reference": "kernel-syms-5.3.18-24.67.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-24.67.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-24.67.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-24.67.3.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-24.67.3.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le"
},
"product_reference": "reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-24.67.3.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x"
},
"product_reference": "reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-24.67.3.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-24.67.3.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le"
},
"product_reference": "kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-24.67.3.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x"
},
"product_reference": "kernel-default-livepatch-5.3.18-24.67.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-24.67.3.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64"
},
"product_reference": "kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-24.67.3.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-24.67.3.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-24.67.3.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le"
},
"product_reference": "cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-24.67.3.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x"
},
"product_reference": "cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-24.67.3.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-24.67.3.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64"
},
"product_reference": "dlm-kmp-default-5.3.18-24.67.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-24.67.3.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le"
},
"product_reference": "dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-24.67.3.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x"
},
"product_reference": "dlm-kmp-default-5.3.18-24.67.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-24.67.3.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64"
},
"product_reference": "dlm-kmp-default-5.3.18-24.67.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-24.67.3.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64"
},
"product_reference": "gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-24.67.3.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le"
},
"product_reference": "gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-24.67.3.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x"
},
"product_reference": "gfs2-kmp-default-5.3.18-24.67.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-24.67.3.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64"
},
"product_reference": "gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-24.67.3.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-24.67.3.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le"
},
"product_reference": "ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-24.67.3.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x"
},
"product_reference": "ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-24.67.3.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.3.18-24.67.3.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP2",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64"
},
"product_reference": "kernel-default-extra-5.3.18-24.67.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-extra-5.3.18-24.67.4.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP2",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
},
"product_reference": "kernel-preempt-extra-5.3.18-24.67.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-24.67.3.aarch64 as component of SUSE Linux Enterprise Micro 5.0",
"product_id": "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64"
},
"product_reference": "kernel-default-5.3.18-24.67.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-24.67.3.x86_64 as component of SUSE Linux Enterprise Micro 5.0",
"product_id": "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64"
},
"product_reference": "kernel-default-5.3.18-24.67.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64 as component of SUSE Linux Enterprise Micro 5.0",
"product_id": "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64 as component of SUSE Linux Enterprise Micro 5.0",
"product_id": "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-24586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24586"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24586",
"url": "https://www.suse.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:08:52Z",
"details": "moderate"
}
],
"title": "CVE-2020-24586"
},
{
"cve": "CVE-2020-24587",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24587"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24587",
"url": "https://www.suse.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1185862 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:08:52Z",
"details": "moderate"
}
],
"title": "CVE-2020-24587"
},
{
"cve": "CVE-2020-24588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24588"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24588",
"url": "https://www.suse.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "SUSE Bug 1185861 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1192868"
},
{
"category": "external",
"summary": "SUSE Bug 1199701 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1199701"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:08:52Z",
"details": "moderate"
}
],
"title": "CVE-2020-24588"
},
{
"cve": "CVE-2020-26139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26139"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26139",
"url": "https://www.suse.com/security/cve/CVE-2020-26139"
},
{
"category": "external",
"summary": "SUSE Bug 1186062 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:08:52Z",
"details": "moderate"
}
],
"title": "CVE-2020-26139"
},
{
"cve": "CVE-2020-26141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26141"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26141",
"url": "https://www.suse.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "SUSE Bug 1185987 for CVE-2020-26141",
"url": "https://bugzilla.suse.com/1185987"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:08:52Z",
"details": "moderate"
}
],
"title": "CVE-2020-26141"
},
{
"cve": "CVE-2020-26145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26145"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26145",
"url": "https://www.suse.com/security/cve/CVE-2020-26145"
},
{
"category": "external",
"summary": "SUSE Bug 1185860 for CVE-2020-26145",
"url": "https://bugzilla.suse.com/1185860"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:08:52Z",
"details": "moderate"
}
],
"title": "CVE-2020-26145"
},
{
"cve": "CVE-2020-26147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26147"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26147",
"url": "https://www.suse.com/security/cve/CVE-2020-26147"
},
{
"category": "external",
"summary": "SUSE Bug 1233723 for CVE-2020-26147",
"url": "https://bugzilla.suse.com/1233723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:08:52Z",
"details": "moderate"
}
],
"title": "CVE-2020-26147"
},
{
"cve": "CVE-2021-23134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23134"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23134",
"url": "https://www.suse.com/security/cve/CVE-2021-23134"
},
{
"category": "external",
"summary": "SUSE Bug 1186060 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "external",
"summary": "SUSE Bug 1186061 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "external",
"summary": "SUSE Bug 1220739 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1220739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:08:52Z",
"details": "important"
}
],
"title": "CVE-2021-23134"
},
{
"cve": "CVE-2021-32399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32399"
}
],
"notes": [
{
"category": "general",
"text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32399",
"url": "https://www.suse.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "SUSE Bug 1184611 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "external",
"summary": "SUSE Bug 1185898 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "external",
"summary": "SUSE Bug 1185899 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:08:52Z",
"details": "important"
}
],
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-33034",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33034"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33034",
"url": "https://www.suse.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "SUSE Bug 1186111 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "external",
"summary": "SUSE Bug 1186285 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:08:52Z",
"details": "important"
}
],
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-33200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33200"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-\u003ealu_limit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33200",
"url": "https://www.suse.com/security/cve/CVE-2021-33200"
},
{
"category": "external",
"summary": "SUSE Bug 1186484 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "external",
"summary": "SUSE Bug 1186498 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:08:52Z",
"details": "important"
}
],
"title": "CVE-2021-33200"
},
{
"cve": "CVE-2021-3491",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3491"
}
],
"notes": [
{
"category": "general",
"text": "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3491",
"url": "https://www.suse.com/security/cve/CVE-2021-3491"
},
{
"category": "external",
"summary": "SUSE Bug 1185642 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "external",
"summary": "SUSE Bug 1187090 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1187090"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:08:52Z",
"details": "important"
}
],
"title": "CVE-2021-3491"
}
]
}
suse-su-2021:1912-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-33200: Enforcing incorrect limits for pointer arithmetic operations by the BPF verifier could be abused to perform out-of-bounds reads and writes in kernel memory (bsc#1186484).\n- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values. (bsc#1186111)\n- CVE-2020-26139: Fixed a denial-of-service when an Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. (bnc#1186062)\n- CVE-2021-23134: A Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges. (bnc#1186060)\n- CVE-2021-23133: Fixed a race condition in SCTP sockets, which could lead to privilege escalation from the context of a network service or an unprivileged process. (bnc#1184675)\n- CVE-2021-3491: Fixed a potential heap overflow in mem_rw(). This vulnerability is related to the PROVIDE_BUFFERS operation, which allowed the MAX_RW_COUNT limit to be bypassed (bsc#1185642).\n- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).\n- CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances this can be abused to inject arbitrary network packets and/or exfiltrate user data (bnc#1185859).\n- CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed (bnc#1185859 bnc#1185862).\n- CVE-2020-26147: The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments, even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used (bnc#1185859).\n- CVE-2020-26145: An issue was discovered with Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration. (bnc#1185860)\n- CVE-2020-26141: An issue was discovered in the ALFA driver for AWUS036H, where the Message Integrity Check (authenticity) of fragmented TKIP frames was not verified. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bnc#1185987)\n\n\nThe following non-security bugs were fixed:\n\n- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185725).\n- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185725).\n- dm: fix redundant IO accounting for bios that need splitting (bsc#1183738).\n- ibmvfc: Avoid move login if fast fail is enabled (bsc#1185938 ltc#192043).\n- ibmvfc: Handle move login failure (bsc#1185938 ltc#192043).\n- ibmvfc: Reinit target retries (bsc#1185938 ltc#192043).\n- kabi: Fix breakage in NVMe driver (bsc#1181161).\n- kabi: Fix nvmet error log definitions (bsc#1181161).\n- kabi: nvme: fix fast_io_fail_tmo (bsc#1181161).\n- md/raid1: properly indicate failure when ending a failed write request (bsc#1185680).\n- net: sched: disable TCQ_F_NOLOCK for pfifo_fast (bsc#1183405)\n- netfilter: conntrack: add new sysctl to disable RST check (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: avoid misleading \u0027invalid\u0027 in log message (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: improve RST handling when tuple is re-used (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: tcp: only close if RST matches exact sequence (bsc#1183947 bsc#1185950).\n- nvme-fabrics: allow to queue requests for live queues (bsc#1181161).\n- nvme-fabrics: do not check state NVME_CTRL_NEW for request acceptance (bsc#1181161).\n- nvme-fabrics: reject I/O to offline device (bsc#1181161).\n- nvme-pci: Sync queues on reset (bsc#1181161).\n- nvme-rdma: avoid race between time out and tear down (bsc#1181161).\n- nvme-rdma: avoid repeated request completion (bsc#1181161).\n- nvme-rdma: avoid request double completion for concurrent nvme_rdma_timeout (bsc#1181161).\n- nvme-rdma: fix controller reset hang during traffic (bsc#1181161).\n- nvme-rdma: fix possible hang when failing to set io queues (bsc#1181161).\n- nvme-rdma: fix timeout handler (bsc#1181161).\n- nvme-rdma: serialize controller teardown sequences (bsc#1181161).\n- nvme-tcp: avoid race between time out and tear down (bsc#1181161).\n- nvme-tcp: avoid repeated request completion (bsc#1181161).\n- nvme-tcp: avoid request double completion for concurrent nvme_tcp_timeout (bsc#1181161).\n- nvme-tcp: fix controller reset hang during traffic (bsc#1181161).\n- nvme-tcp: fix possible hang when failing to set io queues (bsc#1181161).\n- nvme-tcp: fix timeout handler (bsc#1181161).\n- nvme-tcp: serialize controller teardown sequences (bsc#1181161).\n- nvme: Restart request timers in resetting state (bsc#1181161).\n- nvme: add error log page slot definition (bsc#1181161).\n- nvme: include admin_q sync with nvme_sync_queues (bsc#1181161).\n- nvme: introduce \u0027Command Aborted By host\u0027 status code (bsc#1181161).\n- nvme: introduce nvme_is_fabrics to check fabrics cmd (bsc#1181161).\n- nvme: introduce nvme_sync_io_queues (bsc#1181161).\n- nvme: make fabrics command run on a separate request queue (bsc#1181161).\n- nvme: prevent warning triggered by nvme_stop_keep_alive (bsc#1181161).\n- nvme: unlink head after removing last namespace (bsc#1181161).\n- nvmet: add error log support for fabrics-cmd (bsc#1181161).\n- nvmet: add error-log definitions (bsc#1181161).\n- video: hyperv_fb: Add ratelimit on error message (bsc#1185725).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-1912,SUSE-SLE-Module-Live-Patching-15-SP1-2021-1912,SUSE-SLE-Product-HA-15-SP1-2021-1912,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-1912,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-1912,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-1912,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-1912,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-1912,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-1912,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-1912,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-1912,SUSE-Storage-6-2021-1912",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_1912-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:1912-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20211912-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:1912-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/008974.html"
},
{
"category": "self",
"summary": "SUSE Bug 1181161",
"url": "https://bugzilla.suse.com/1181161"
},
{
"category": "self",
"summary": "SUSE Bug 1183405",
"url": "https://bugzilla.suse.com/1183405"
},
{
"category": "self",
"summary": "SUSE Bug 1183738",
"url": "https://bugzilla.suse.com/1183738"
},
{
"category": "self",
"summary": "SUSE Bug 1183947",
"url": "https://bugzilla.suse.com/1183947"
},
{
"category": "self",
"summary": "SUSE Bug 1184611",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "self",
"summary": "SUSE Bug 1184675",
"url": "https://bugzilla.suse.com/1184675"
},
{
"category": "self",
"summary": "SUSE Bug 1185642",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "self",
"summary": "SUSE Bug 1185680",
"url": "https://bugzilla.suse.com/1185680"
},
{
"category": "self",
"summary": "SUSE Bug 1185725",
"url": "https://bugzilla.suse.com/1185725"
},
{
"category": "self",
"summary": "SUSE Bug 1185859",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "self",
"summary": "SUSE Bug 1185860",
"url": "https://bugzilla.suse.com/1185860"
},
{
"category": "self",
"summary": "SUSE Bug 1185862",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "self",
"summary": "SUSE Bug 1185863",
"url": "https://bugzilla.suse.com/1185863"
},
{
"category": "self",
"summary": "SUSE Bug 1185898",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "self",
"summary": "SUSE Bug 1185899",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "self",
"summary": "SUSE Bug 1185901",
"url": "https://bugzilla.suse.com/1185901"
},
{
"category": "self",
"summary": "SUSE Bug 1185938",
"url": "https://bugzilla.suse.com/1185938"
},
{
"category": "self",
"summary": "SUSE Bug 1185950",
"url": "https://bugzilla.suse.com/1185950"
},
{
"category": "self",
"summary": "SUSE Bug 1185987",
"url": "https://bugzilla.suse.com/1185987"
},
{
"category": "self",
"summary": "SUSE Bug 1186060",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "self",
"summary": "SUSE Bug 1186061",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "self",
"summary": "SUSE Bug 1186062",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "self",
"summary": "SUSE Bug 1186111",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "self",
"summary": "SUSE Bug 1186285",
"url": "https://bugzilla.suse.com/1186285"
},
{
"category": "self",
"summary": "SUSE Bug 1186390",
"url": "https://bugzilla.suse.com/1186390"
},
{
"category": "self",
"summary": "SUSE Bug 1186484",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "self",
"summary": "SUSE Bug 1186498",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24586 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24587 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24587/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26139 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26141 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26145 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26145/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26147 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23133 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23134 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32399 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33034 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33034/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33200 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3491 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3491/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-06-09T11:54:48Z",
"generator": {
"date": "2021-06-09T11:54:48Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:1912-1",
"initial_release_date": "2021-06-09T11:54:48Z",
"revision_history": [
{
"date": "2021-06-09T11:54:48Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"product_id": "cluster-md-kmp-default-4.12.14-197.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-197.92.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.12.14-197.92.1.aarch64",
"product_id": "dlm-kmp-default-4.12.14-197.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"product_id": "gfs2-kmp-default-4.12.14-197.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-197.92.1.aarch64",
"product": {
"name": "kernel-default-4.12.14-197.92.1.aarch64",
"product_id": "kernel-default-4.12.14-197.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-197.92.1.aarch64",
"product": {
"name": "kernel-default-base-4.12.14-197.92.1.aarch64",
"product_id": "kernel-default-base-4.12.14-197.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-197.92.1.aarch64",
"product": {
"name": "kernel-default-devel-4.12.14-197.92.1.aarch64",
"product_id": "kernel-default-devel-4.12.14-197.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-197.92.1.aarch64",
"product": {
"name": "kernel-default-extra-4.12.14-197.92.1.aarch64",
"product_id": "kernel-default-extra-4.12.14-197.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-197.92.1.aarch64",
"product": {
"name": "kernel-default-livepatch-4.12.14-197.92.1.aarch64",
"product_id": "kernel-default-livepatch-4.12.14-197.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-197.92.1.aarch64",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-197.92.1.aarch64",
"product_id": "kernel-default-livepatch-devel-4.12.14-197.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-197.92.1.aarch64",
"product": {
"name": "kernel-obs-build-4.12.14-197.92.1.aarch64",
"product_id": "kernel-obs-build-4.12.14-197.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-197.92.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.12.14-197.92.1.aarch64",
"product_id": "kernel-obs-qa-4.12.14-197.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-197.92.1.aarch64",
"product": {
"name": "kernel-syms-4.12.14-197.92.1.aarch64",
"product_id": "kernel-syms-4.12.14-197.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-197.92.1.aarch64",
"product": {
"name": "kernel-vanilla-4.12.14-197.92.1.aarch64",
"product_id": "kernel-vanilla-4.12.14-197.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-197.92.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.12.14-197.92.1.aarch64",
"product_id": "kernel-vanilla-base-4.12.14-197.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-197.92.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-197.92.1.aarch64",
"product_id": "kernel-vanilla-devel-4.12.14-197.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.92.1.aarch64",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.92.1.aarch64",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-197.92.1.aarch64",
"product": {
"name": "kselftests-kmp-default-4.12.14-197.92.1.aarch64",
"product_id": "kselftests-kmp-default-4.12.14-197.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"product_id": "ocfs2-kmp-default-4.12.14-197.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"product": {
"name": "reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"product_id": "reiserfs-kmp-default-4.12.14-197.92.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.12.14-197.92.1.noarch",
"product": {
"name": "kernel-devel-4.12.14-197.92.1.noarch",
"product_id": "kernel-devel-4.12.14-197.92.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.12.14-197.92.1.noarch",
"product": {
"name": "kernel-docs-4.12.14-197.92.1.noarch",
"product_id": "kernel-docs-4.12.14-197.92.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.12.14-197.92.1.noarch",
"product": {
"name": "kernel-docs-html-4.12.14-197.92.1.noarch",
"product_id": "kernel-docs-html-4.12.14-197.92.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.12.14-197.92.1.noarch",
"product": {
"name": "kernel-macros-4.12.14-197.92.1.noarch",
"product_id": "kernel-macros-4.12.14-197.92.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.12.14-197.92.1.noarch",
"product": {
"name": "kernel-source-4.12.14-197.92.1.noarch",
"product_id": "kernel-source-4.12.14-197.92.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.12.14-197.92.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.12.14-197.92.1.noarch",
"product_id": "kernel-source-vanilla-4.12.14-197.92.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.12.14-197.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"product_id": "dlm-kmp-default-4.12.14-197.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"product_id": "gfs2-kmp-default-4.12.14-197.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-197.92.1.ppc64le",
"product": {
"name": "kernel-debug-4.12.14-197.92.1.ppc64le",
"product_id": "kernel-debug-4.12.14-197.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-197.92.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.12.14-197.92.1.ppc64le",
"product_id": "kernel-debug-base-4.12.14-197.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-197.92.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.12.14-197.92.1.ppc64le",
"product_id": "kernel-debug-devel-4.12.14-197.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-4.12.14-197.92.1.ppc64le",
"product": {
"name": "kernel-debug-livepatch-devel-4.12.14-197.92.1.ppc64le",
"product_id": "kernel-debug-livepatch-devel-4.12.14-197.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-197.92.1.ppc64le",
"product": {
"name": "kernel-default-4.12.14-197.92.1.ppc64le",
"product_id": "kernel-default-4.12.14-197.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-197.92.1.ppc64le",
"product": {
"name": "kernel-default-base-4.12.14-197.92.1.ppc64le",
"product_id": "kernel-default-base-4.12.14-197.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-197.92.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.12.14-197.92.1.ppc64le",
"product_id": "kernel-default-devel-4.12.14-197.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-197.92.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.12.14-197.92.1.ppc64le",
"product_id": "kernel-default-extra-4.12.14-197.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"product_id": "kernel-default-livepatch-4.12.14-197.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"product_id": "kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-197.92.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.12.14-197.92.1.ppc64le",
"product_id": "kernel-obs-build-4.12.14-197.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-197.92.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.12.14-197.92.1.ppc64le",
"product_id": "kernel-obs-qa-4.12.14-197.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-197.92.1.ppc64le",
"product": {
"name": "kernel-syms-4.12.14-197.92.1.ppc64le",
"product_id": "kernel-syms-4.12.14-197.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-197.92.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.12.14-197.92.1.ppc64le",
"product_id": "kernel-vanilla-4.12.14-197.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-197.92.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.12.14-197.92.1.ppc64le",
"product_id": "kernel-vanilla-base-4.12.14-197.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-197.92.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.12.14-197.92.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.12.14-197.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.92.1.ppc64le",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.92.1.ppc64le",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-197.92.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.12.14-197.92.1.ppc64le",
"product_id": "kselftests-kmp-default-4.12.14-197.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.12.14-197.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"product": {
"name": "reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"product_id": "reiserfs-kmp-default-4.12.14-197.92.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"product_id": "cluster-md-kmp-default-4.12.14-197.92.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-197.92.1.s390x",
"product": {
"name": "dlm-kmp-default-4.12.14-197.92.1.s390x",
"product_id": "dlm-kmp-default-4.12.14-197.92.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-197.92.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.12.14-197.92.1.s390x",
"product_id": "gfs2-kmp-default-4.12.14-197.92.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-197.92.1.s390x",
"product": {
"name": "kernel-default-4.12.14-197.92.1.s390x",
"product_id": "kernel-default-4.12.14-197.92.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-197.92.1.s390x",
"product": {
"name": "kernel-default-base-4.12.14-197.92.1.s390x",
"product_id": "kernel-default-base-4.12.14-197.92.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-197.92.1.s390x",
"product": {
"name": "kernel-default-devel-4.12.14-197.92.1.s390x",
"product_id": "kernel-default-devel-4.12.14-197.92.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-197.92.1.s390x",
"product": {
"name": "kernel-default-extra-4.12.14-197.92.1.s390x",
"product_id": "kernel-default-extra-4.12.14-197.92.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-197.92.1.s390x",
"product": {
"name": "kernel-default-livepatch-4.12.14-197.92.1.s390x",
"product_id": "kernel-default-livepatch-4.12.14-197.92.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-197.92.1.s390x",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-197.92.1.s390x",
"product_id": "kernel-default-livepatch-devel-4.12.14-197.92.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.12.14-197.92.1.s390x",
"product": {
"name": "kernel-default-man-4.12.14-197.92.1.s390x",
"product_id": "kernel-default-man-4.12.14-197.92.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-197.92.1.s390x",
"product": {
"name": "kernel-obs-build-4.12.14-197.92.1.s390x",
"product_id": "kernel-obs-build-4.12.14-197.92.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-197.92.1.s390x",
"product": {
"name": "kernel-obs-qa-4.12.14-197.92.1.s390x",
"product_id": "kernel-obs-qa-4.12.14-197.92.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-197.92.1.s390x",
"product": {
"name": "kernel-syms-4.12.14-197.92.1.s390x",
"product_id": "kernel-syms-4.12.14-197.92.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-197.92.1.s390x",
"product": {
"name": "kernel-vanilla-4.12.14-197.92.1.s390x",
"product_id": "kernel-vanilla-4.12.14-197.92.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-197.92.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.12.14-197.92.1.s390x",
"product_id": "kernel-vanilla-base-4.12.14-197.92.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-197.92.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.12.14-197.92.1.s390x",
"product_id": "kernel-vanilla-devel-4.12.14-197.92.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.92.1.s390x",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.92.1.s390x",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.92.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.12.14-197.92.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.12.14-197.92.1.s390x",
"product_id": "kernel-zfcpdump-4.12.14-197.92.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-man-4.12.14-197.92.1.s390x",
"product": {
"name": "kernel-zfcpdump-man-4.12.14-197.92.1.s390x",
"product_id": "kernel-zfcpdump-man-4.12.14-197.92.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-197.92.1.s390x",
"product": {
"name": "kselftests-kmp-default-4.12.14-197.92.1.s390x",
"product_id": "kselftests-kmp-default-4.12.14-197.92.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"product_id": "ocfs2-kmp-default-4.12.14-197.92.1.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"product": {
"name": "reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"product_id": "reiserfs-kmp-default-4.12.14-197.92.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"product_id": "cluster-md-kmp-default-4.12.14-197.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-197.92.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.12.14-197.92.1.x86_64",
"product_id": "dlm-kmp-default-4.12.14-197.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"product_id": "gfs2-kmp-default-4.12.14-197.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-197.92.1.x86_64",
"product": {
"name": "kernel-debug-4.12.14-197.92.1.x86_64",
"product_id": "kernel-debug-4.12.14-197.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-197.92.1.x86_64",
"product": {
"name": "kernel-debug-base-4.12.14-197.92.1.x86_64",
"product_id": "kernel-debug-base-4.12.14-197.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-197.92.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.12.14-197.92.1.x86_64",
"product_id": "kernel-debug-devel-4.12.14-197.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-4.12.14-197.92.1.x86_64",
"product": {
"name": "kernel-debug-livepatch-devel-4.12.14-197.92.1.x86_64",
"product_id": "kernel-debug-livepatch-devel-4.12.14-197.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-197.92.1.x86_64",
"product": {
"name": "kernel-default-4.12.14-197.92.1.x86_64",
"product_id": "kernel-default-4.12.14-197.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-197.92.1.x86_64",
"product": {
"name": "kernel-default-base-4.12.14-197.92.1.x86_64",
"product_id": "kernel-default-base-4.12.14-197.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-197.92.1.x86_64",
"product": {
"name": "kernel-default-devel-4.12.14-197.92.1.x86_64",
"product_id": "kernel-default-devel-4.12.14-197.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-197.92.1.x86_64",
"product": {
"name": "kernel-default-extra-4.12.14-197.92.1.x86_64",
"product_id": "kernel-default-extra-4.12.14-197.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"product": {
"name": "kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"product_id": "kernel-default-livepatch-4.12.14-197.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"product_id": "kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-4.12.14-197.92.1.x86_64",
"product": {
"name": "kernel-kvmsmall-4.12.14-197.92.1.x86_64",
"product_id": "kernel-kvmsmall-4.12.14-197.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-197.92.1.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-197.92.1.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-197.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-4.12.14-197.92.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-4.12.14-197.92.1.x86_64",
"product_id": "kernel-kvmsmall-devel-4.12.14-197.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-4.12.14-197.92.1.x86_64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-4.12.14-197.92.1.x86_64",
"product_id": "kernel-kvmsmall-livepatch-devel-4.12.14-197.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-197.92.1.x86_64",
"product": {
"name": "kernel-obs-build-4.12.14-197.92.1.x86_64",
"product_id": "kernel-obs-build-4.12.14-197.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-197.92.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.12.14-197.92.1.x86_64",
"product_id": "kernel-obs-qa-4.12.14-197.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-197.92.1.x86_64",
"product": {
"name": "kernel-syms-4.12.14-197.92.1.x86_64",
"product_id": "kernel-syms-4.12.14-197.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-197.92.1.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-197.92.1.x86_64",
"product_id": "kernel-vanilla-4.12.14-197.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-197.92.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-197.92.1.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-197.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-197.92.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-197.92.1.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-197.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.92.1.x86_64",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.92.1.x86_64",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-197.92.1.x86_64",
"product": {
"name": "kselftests-kmp-default-4.12.14-197.92.1.x86_64",
"product_id": "kselftests-kmp-default-4.12.14-197.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"product_id": "ocfs2-kmp-default-4.12.14-197.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"product": {
"name": "reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"product_id": "reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15 SP1",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP1-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_bcl:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Proxy 4.0",
"product": {
"name": "SUSE Manager Proxy 4.0",
"product_id": "SUSE Manager Proxy 4.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-proxy:4.0"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Retail Branch Server 4.0",
"product": {
"name": "SUSE Manager Retail Branch Server 4.0",
"product_id": "SUSE Manager Retail Branch Server 4.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-retail-branch-server:4.0"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Server 4.0",
"product": {
"name": "SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-server:4.0"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 6",
"product": {
"name": "SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-4.12.14-197.92.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-197.92.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-197.92.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-197.92.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-197.92.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64"
},
"product_reference": "dlm-kmp-default-4.12.14-197.92.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-197.92.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-197.92.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x"
},
"product_reference": "dlm-kmp-default-4.12.14-197.92.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-197.92.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64"
},
"product_reference": "gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-197.92.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-197.92.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.12.14-197.92.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-197.92.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-197.92.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-197.92.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.92.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-197.92.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.92.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-197.92.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.92.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-197.92.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-197.92.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-197.92.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-197.92.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.92.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-197.92.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-197.92.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-source-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.92.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-197.92.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.92.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-197.92.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.92.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-197.92.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.92.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-197.92.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-197.92.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-197.92.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-197.92.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.92.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-197.92.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-197.92.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-source-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.92.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-197.92.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-197.92.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-197.92.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-197.92.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-197.92.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-source-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.92.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-197.92.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.92.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-197.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.92.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x"
},
"product_reference": "kernel-default-4.12.14-197.92.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.92.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-197.92.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.92.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-197.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.92.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-197.92.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.92.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-197.92.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.92.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-197.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.92.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-197.92.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-197.92.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-197.92.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-197.92.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-197.92.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-197.92.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.92.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-197.92.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.92.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-197.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.92.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x"
},
"product_reference": "kernel-obs-build-4.12.14-197.92.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-197.92.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-source-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.92.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-197.92.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.92.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-197.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.92.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-197.92.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.92.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.92.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.92.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.92.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-197.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.92.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-197.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.92.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-197.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-197.92.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-197.92.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-197.92.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.92.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-197.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-197.92.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-source-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.92.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-197.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.92.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.92.1.x86_64 as component of SUSE Manager Proxy 4.0",
"product_id": "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.92.1.x86_64 as component of SUSE Manager Proxy 4.0",
"product_id": "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.92.1.x86_64 as component of SUSE Manager Proxy 4.0",
"product_id": "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-197.92.1.noarch as component of SUSE Manager Proxy 4.0",
"product_id": "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Manager Proxy 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-197.92.1.noarch as component of SUSE Manager Proxy 4.0",
"product_id": "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Manager Proxy 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-197.92.1.noarch as component of SUSE Manager Proxy 4.0",
"product_id": "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Manager Proxy 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.92.1.x86_64 as component of SUSE Manager Proxy 4.0",
"product_id": "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-197.92.1.noarch as component of SUSE Manager Proxy 4.0",
"product_id": "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-source-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Manager Proxy 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.92.1.x86_64 as component of SUSE Manager Proxy 4.0",
"product_id": "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.92.1.x86_64 as component of SUSE Manager Proxy 4.0",
"product_id": "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.92.1.x86_64 as component of SUSE Manager Retail Branch Server 4.0",
"product_id": "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.92.1.x86_64 as component of SUSE Manager Retail Branch Server 4.0",
"product_id": "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.92.1.x86_64 as component of SUSE Manager Retail Branch Server 4.0",
"product_id": "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-197.92.1.noarch as component of SUSE Manager Retail Branch Server 4.0",
"product_id": "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-197.92.1.noarch as component of SUSE Manager Retail Branch Server 4.0",
"product_id": "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-197.92.1.noarch as component of SUSE Manager Retail Branch Server 4.0",
"product_id": "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.92.1.x86_64 as component of SUSE Manager Retail Branch Server 4.0",
"product_id": "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-197.92.1.noarch as component of SUSE Manager Retail Branch Server 4.0",
"product_id": "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-source-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.92.1.x86_64 as component of SUSE Manager Retail Branch Server 4.0",
"product_id": "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.92.1.x86_64 as component of SUSE Manager Retail Branch Server 4.0",
"product_id": "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.92.1.ppc64le as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-197.92.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.92.1.s390x as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x"
},
"product_reference": "kernel-default-4.12.14-197.92.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.92.1.x86_64 as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.92.1.ppc64le as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-197.92.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.92.1.s390x as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-197.92.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.92.1.x86_64 as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.92.1.ppc64le as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-197.92.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.92.1.s390x as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-197.92.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.92.1.x86_64 as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-197.92.1.s390x as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-197.92.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-197.92.1.noarch as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-197.92.1.noarch as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-197.92.1.noarch as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.92.1.ppc64le as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-197.92.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.92.1.s390x as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x"
},
"product_reference": "kernel-obs-build-4.12.14-197.92.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.92.1.x86_64 as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-197.92.1.noarch as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-source-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.92.1.ppc64le as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-197.92.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.92.1.s390x as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-197.92.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.92.1.x86_64 as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.92.1.ppc64le as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.92.1.s390x as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.92.1.x86_64 as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.92.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-197.92.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.92.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.92.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-197.92.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.92.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.92.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-197.92.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.92.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-197.92.1.noarch as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-197.92.1.noarch as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-197.92.1.noarch as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.92.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-197.92.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.92.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-197.92.1.noarch as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-source-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.92.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-197.92.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.92.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.92.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.92.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-24586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24586"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24586",
"url": "https://www.suse.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-09T11:54:48Z",
"details": "moderate"
}
],
"title": "CVE-2020-24586"
},
{
"cve": "CVE-2020-24587",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24587"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24587",
"url": "https://www.suse.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1185862 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-09T11:54:48Z",
"details": "moderate"
}
],
"title": "CVE-2020-24587"
},
{
"cve": "CVE-2020-26139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26139"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26139",
"url": "https://www.suse.com/security/cve/CVE-2020-26139"
},
{
"category": "external",
"summary": "SUSE Bug 1186062 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-09T11:54:48Z",
"details": "moderate"
}
],
"title": "CVE-2020-26139"
},
{
"cve": "CVE-2020-26141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26141"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26141",
"url": "https://www.suse.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "SUSE Bug 1185987 for CVE-2020-26141",
"url": "https://bugzilla.suse.com/1185987"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-09T11:54:48Z",
"details": "moderate"
}
],
"title": "CVE-2020-26141"
},
{
"cve": "CVE-2020-26145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26145"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26145",
"url": "https://www.suse.com/security/cve/CVE-2020-26145"
},
{
"category": "external",
"summary": "SUSE Bug 1185860 for CVE-2020-26145",
"url": "https://bugzilla.suse.com/1185860"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-09T11:54:48Z",
"details": "moderate"
}
],
"title": "CVE-2020-26145"
},
{
"cve": "CVE-2020-26147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26147"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26147",
"url": "https://www.suse.com/security/cve/CVE-2020-26147"
},
{
"category": "external",
"summary": "SUSE Bug 1233723 for CVE-2020-26147",
"url": "https://bugzilla.suse.com/1233723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-09T11:54:48Z",
"details": "moderate"
}
],
"title": "CVE-2020-26147"
},
{
"cve": "CVE-2021-23133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23133"
}
],
"notes": [
{
"category": "general",
"text": "A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23133",
"url": "https://www.suse.com/security/cve/CVE-2021-23133"
},
{
"category": "external",
"summary": "SUSE Bug 1184675 for CVE-2021-23133",
"url": "https://bugzilla.suse.com/1184675"
},
{
"category": "external",
"summary": "SUSE Bug 1185901 for CVE-2021-23133",
"url": "https://bugzilla.suse.com/1185901"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-09T11:54:48Z",
"details": "moderate"
}
],
"title": "CVE-2021-23133"
},
{
"cve": "CVE-2021-23134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23134"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23134",
"url": "https://www.suse.com/security/cve/CVE-2021-23134"
},
{
"category": "external",
"summary": "SUSE Bug 1186060 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "external",
"summary": "SUSE Bug 1186061 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "external",
"summary": "SUSE Bug 1220739 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1220739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-09T11:54:48Z",
"details": "important"
}
],
"title": "CVE-2021-23134"
},
{
"cve": "CVE-2021-32399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32399"
}
],
"notes": [
{
"category": "general",
"text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32399",
"url": "https://www.suse.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "SUSE Bug 1184611 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "external",
"summary": "SUSE Bug 1185898 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "external",
"summary": "SUSE Bug 1185899 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-09T11:54:48Z",
"details": "important"
}
],
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-33034",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33034"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33034",
"url": "https://www.suse.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "SUSE Bug 1186111 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "external",
"summary": "SUSE Bug 1186285 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-09T11:54:48Z",
"details": "important"
}
],
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-33200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33200"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-\u003ealu_limit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33200",
"url": "https://www.suse.com/security/cve/CVE-2021-33200"
},
{
"category": "external",
"summary": "SUSE Bug 1186484 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "external",
"summary": "SUSE Bug 1186498 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-09T11:54:48Z",
"details": "important"
}
],
"title": "CVE-2021-33200"
},
{
"cve": "CVE-2021-3491",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3491"
}
],
"notes": [
{
"category": "general",
"text": "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3491",
"url": "https://www.suse.com/security/cve/CVE-2021-3491"
},
{
"category": "external",
"summary": "SUSE Bug 1185642 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "external",
"summary": "SUSE Bug 1187090 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1187090"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-09T11:54:48Z",
"details": "important"
}
],
"title": "CVE-2021-3491"
}
]
}
suse-su-2021:2451-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)\n- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to obtain full root privileges. (bsc#1188062)\n- CVE-2021-3609: Fixed a race condition in the CAN BCM networking protocol which allows for local privilege escalation. (bsc#1187215)\n- CVE-2021-0605: Fixed an out-of-bounds read which could lead to local information disclosure in the kernel with System execution privileges needed. (bsc#1187601)\n- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187595)\n- CVE-2021-34693: Fixed a bug in net/can/bcm.c which could allow local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized. (bsc#1187452)\n- CVE-2020-36385: Fixed a use-after-free flaw in ucma.c which allows for local privilege escalation. (bsc#1187050)\n- CVE-2021-0129: Fixed an improper access control in BlueZ that may have allowed an authenticated user to potentially enable information disclosure via adjacent access. (bsc#1186463)\n- CVE-2020-26558: Fixed a flaw in the Bluetooth LE and BR/EDR secure pairing that could permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing. (bsc#1179610)\n- CVE-2020-36386: Fixed an out-of-bounds read in hci_extended_inquiry_result_evt. (bsc#1187038)\n- CVE-2020-24588: Fixed a bug that could allow an adversary to abuse devices that support receiving non-SSP A-MSDU frames to inject arbitrary network packets. (bsc#1185861)\n- CVE-2021-32399: Fixed a race condition in net/bluetooth/hci_request.c for removal of the HCI controller. (bsc#1184611)\n- CVE-2021-33034: Fixed an issue in net/bluetooth/hci_event.c where a use-after-free leads to writing an arbitrary value. (bsc#1186111)\n- CVE-2020-26139: Fixed a bug that allows an Access Point (AP) to forward EAPOL frames to other clients even though the sender has not yet successfully authenticated. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and made it easier to exploit other vulnerabilities in connected clients. (bsc#1186062)\n- CVE-2021-23134: Fixed a use After Free vulnerability in nfc sockets which allows local attackers to elevate their privileges. (bsc#1186060)\n- CVE-2020-24586: Fixed a bug that, under the right circumstances, allows to inject arbitrary network packets and/or exfiltrate user data when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP. (bsc#1185859)\n- CVE-2020-26141: Fixed a flaw that could allows an adversary to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bsc#1185987)\n- CVE-2020-26145: Fixed a bug in the WEP, WPA, WPA2, and WPA3 implementations that could allows an adversary to inject arbitrary network packets. (bsc#1185860)\n- CVE-2020-24587: Fixed a bug that allows an adversary to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed. (bsc#1185862)\n- CVE-2020-26147: Fixed a bug in the WEP, WPA, WPA2, and WPA3 implementations that could allows an adversary to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames. (bsc#1185987)\n\nThe following non-security bugs were fixed:\n\n- Bluetooth: SMP: Fail if remote and local public keys are identical (git-fixes).\n- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185724).\n- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185724).\n- hv_netvsc: Add handlers for ethtool get/set msg level (bsc#1175462).\n- hv_netvsc: avoid retry on send during shutdown (bsc#1175462).\n- hv_netvsc: avoid unnecessary wakeups on subchannel creation (bsc#1175462).\n- hv_netvsc: cancel subchannel setup before halting device (bsc#1175462).\n- hv_netvsc: change GPAD teardown order on older versions (bsc#1175462).\n- hv_netvsc: common detach logic (bsc#1175462).\n- hv_netvsc: delay setup of VF device (bsc#1175462).\n- hv_netvsc: disable NAPI before channel close (bsc#1175462).\n- hv_netvsc: Ensure correct teardown message sequence order (bsc#1175462).\n- hv_netvsc: Fix a deadlock by getting rtnl lock earlier in netvsc_probe() (bsc#1175462).\n- hv_netvsc: Fix a network regression after ifdown/ifup (bsc#1175462).\n- hv_netvsc: fix deadlock on hotplug (bsc#1175462).\n- hv_netvsc: Fix error handling in netvsc_attach() (bsc#1175462).\n- hv_netvsc: fix error unwind handling if vmbus_open fails (bsc#1175462).\n- hv_netvsc: Fix extra rcu_read_unlock in netvsc_recv_callback() (bsc#1175462).\n- hv_netvsc: fix handling of fallback to single queue mode (bsc#1175462).\n- hv_netvsc: Fix hash key value reset after other ops (bsc#1175462).\n- hv_netvsc: Fix IP header checksum for coalesced packets (bsc#1175462).\n- hv_netvsc: Fix net device attach on older Windows hosts (bsc#1175462).\n- hv_netvsc: fix network namespace issues with VF support (bsc#1175462).\n- hv_netvsc: Fix NULL dereference at single queue mode fallback (bsc#1175462).\n- hv_netvsc: fix race during initialization (bsc#1175462).\n- hv_netvsc: fix race on sub channel creation (bsc#1175462).\n- hv_netvsc: fix race that may miss tx queue wakeup (bsc#1175462).\n- hv_netvsc: fix schedule in RCU context (bsc#1175462).\n- hv_netvsc: Fix the variable sizes in ipsecv2 and rsc offload (bsc#1175462).\n- hv_netvsc: Fix tx_table init in rndis_set_subchannel() (bsc#1175462).\n- hv_netvsc: Fix unwanted wakeup after tx_disable (bsc#1175462).\n- hv_netvsc: Fix unwanted wakeup in netvsc_attach() (bsc#1175462).\n- hv_netvsc: flag software created hash value (bsc#1175462).\n- hv_netvsc: netvsc_teardown_gpadl() split (bsc#1175462).\n- hv_netvsc: only wake transmit queue if link is up (bsc#1175462).\n- hv_netvsc: pass netvsc_device to rndis halt (bsc#1175462).\n- hv_netvsc: preserve hw_features on mtu/channels/ringparam changes (bsc#1175462).\n- hv_netvsc: Refactor assignments of struct netvsc_device_info (bsc#1175462).\n- hv_netvsc: set master device (bsc#1175462).\n- hv_netvsc: Set tx_table to equal weight after subchannels open (bsc#1175462).\n- hv_netvsc: Simplify num_chn checking in rndis_filter_device_add() (bsc#1175462).\n- hv_netvsc: Split netvsc_revoke_buf() and netvsc_teardown_gpadl() (bsc#1175462).\n- hv_netvsc: split sub-channel setup into async and sync (bsc#1175462).\n- hv_netvsc: typo in NDIS RSS parameters structure (bsc#1175462).\n- hv_netvsc: use RCU to fix concurrent rx and queue changes (bsc#1175462).\n- hv_netvsc: use reciprocal divide to speed up percent calculation (bsc#1175462).\n- hv_netvsc: Use Windows version instead of NVSP version on GPAD teardown (bsc#1175462).\n- kgraft: truncate the output from state_show() sysfs attr (bsc#1186235).\n- mm, memory_hotplug: do not clear numa_node association after hot_remove (bsc#1115026).\n- mm: consider __HW_POISON pages when allocating from pcp lists (bsc#1187388).\n- scsi: storvsc: Enable scatterlist entry lengths \u003e 4Kbytes (bsc#1187193).\n- video: hyperv_fb: Add ratelimit on error message (bsc#1185724).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "HPE-Helion-OpenStack-8-2021-2451,SUSE-2021-2451,SUSE-OpenStack-Cloud-8-2021-2451,SUSE-OpenStack-Cloud-Crowbar-8-2021-2451,SUSE-SLE-HA-12-SP3-2021-2451,SUSE-SLE-SAP-12-SP3-2021-2451,SUSE-SLE-SERVER-12-SP3-2021-2451,SUSE-SLE-SERVER-12-SP3-BCL-2021-2451",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2451-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2451-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212451-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2451-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html"
},
{
"category": "self",
"summary": "SUSE Bug 1115026",
"url": "https://bugzilla.suse.com/1115026"
},
{
"category": "self",
"summary": "SUSE Bug 1175462",
"url": "https://bugzilla.suse.com/1175462"
},
{
"category": "self",
"summary": "SUSE Bug 1179610",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "self",
"summary": "SUSE Bug 1184611",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "self",
"summary": "SUSE Bug 1185724",
"url": "https://bugzilla.suse.com/1185724"
},
{
"category": "self",
"summary": "SUSE Bug 1185859",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "self",
"summary": "SUSE Bug 1185860",
"url": "https://bugzilla.suse.com/1185860"
},
{
"category": "self",
"summary": "SUSE Bug 1185861",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "self",
"summary": "SUSE Bug 1185862",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "self",
"summary": "SUSE Bug 1185863",
"url": "https://bugzilla.suse.com/1185863"
},
{
"category": "self",
"summary": "SUSE Bug 1185898",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "self",
"summary": "SUSE Bug 1185987",
"url": "https://bugzilla.suse.com/1185987"
},
{
"category": "self",
"summary": "SUSE Bug 1186060",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "self",
"summary": "SUSE Bug 1186062",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "self",
"summary": "SUSE Bug 1186111",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "self",
"summary": "SUSE Bug 1186235",
"url": "https://bugzilla.suse.com/1186235"
},
{
"category": "self",
"summary": "SUSE Bug 1186390",
"url": "https://bugzilla.suse.com/1186390"
},
{
"category": "self",
"summary": "SUSE Bug 1186463",
"url": "https://bugzilla.suse.com/1186463"
},
{
"category": "self",
"summary": "SUSE Bug 1187038",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "self",
"summary": "SUSE Bug 1187050",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "self",
"summary": "SUSE Bug 1187193",
"url": "https://bugzilla.suse.com/1187193"
},
{
"category": "self",
"summary": "SUSE Bug 1187215",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "self",
"summary": "SUSE Bug 1187388",
"url": "https://bugzilla.suse.com/1187388"
},
{
"category": "self",
"summary": "SUSE Bug 1187452",
"url": "https://bugzilla.suse.com/1187452"
},
{
"category": "self",
"summary": "SUSE Bug 1187595",
"url": "https://bugzilla.suse.com/1187595"
},
{
"category": "self",
"summary": "SUSE Bug 1187601",
"url": "https://bugzilla.suse.com/1187601"
},
{
"category": "self",
"summary": "SUSE Bug 1187934",
"url": "https://bugzilla.suse.com/1187934"
},
{
"category": "self",
"summary": "SUSE Bug 1188062",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "self",
"summary": "SUSE Bug 1188063",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "self",
"summary": "SUSE Bug 1188116",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24586 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24587 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24587/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24588 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26139 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26141 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26145 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26145/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26147 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26558 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36385 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36386 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36386/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0129 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0512 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0512/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0605 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0605/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22555 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23134 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32399 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33034 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33034/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-34693 page",
"url": "https://www.suse.com/security/cve/CVE-2021-34693/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3609 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3609/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-07-22T11:16:06Z",
"generator": {
"date": "2021-07-22T11:16:06Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2451-1",
"initial_release_date": "2021-07-22T11:16:06Z",
"revision_history": [
{
"date": "2021-07-22T11:16:06Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.180-94.147.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.4.180-94.147.1.aarch64",
"product_id": "cluster-md-kmp-default-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.180-94.147.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.4.180-94.147.1.aarch64",
"product_id": "dlm-kmp-default-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.180-94.147.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.4.180-94.147.1.aarch64",
"product_id": "gfs2-kmp-default-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.180-94.147.1.aarch64",
"product": {
"name": "kernel-default-4.4.180-94.147.1.aarch64",
"product_id": "kernel-default-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.180-94.147.1.aarch64",
"product": {
"name": "kernel-default-base-4.4.180-94.147.1.aarch64",
"product_id": "kernel-default-base-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.180-94.147.1.aarch64",
"product": {
"name": "kernel-default-devel-4.4.180-94.147.1.aarch64",
"product_id": "kernel-default-devel-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.180-94.147.1.aarch64",
"product": {
"name": "kernel-default-extra-4.4.180-94.147.1.aarch64",
"product_id": "kernel-default-extra-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.180-94.147.1.aarch64",
"product": {
"name": "kernel-default-kgraft-4.4.180-94.147.1.aarch64",
"product_id": "kernel-default-kgraft-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.180-94.147.1.aarch64",
"product": {
"name": "kernel-obs-build-4.4.180-94.147.1.aarch64",
"product_id": "kernel-obs-build-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.180-94.147.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.4.180-94.147.1.aarch64",
"product_id": "kernel-obs-qa-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.180-94.147.1.aarch64",
"product": {
"name": "kernel-syms-4.4.180-94.147.1.aarch64",
"product_id": "kernel-syms-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.180-94.147.1.aarch64",
"product": {
"name": "kernel-vanilla-4.4.180-94.147.1.aarch64",
"product_id": "kernel-vanilla-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.180-94.147.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.4.180-94.147.1.aarch64",
"product_id": "kernel-vanilla-base-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.180-94.147.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.4.180-94.147.1.aarch64",
"product_id": "kernel-vanilla-devel-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.4.180-94.147.1.aarch64",
"product": {
"name": "kselftests-kmp-default-4.4.180-94.147.1.aarch64",
"product_id": "kselftests-kmp-default-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.180-94.147.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.4.180-94.147.1.aarch64",
"product_id": "ocfs2-kmp-default-4.4.180-94.147.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.4.180-94.147.1.noarch",
"product": {
"name": "kernel-devel-4.4.180-94.147.1.noarch",
"product_id": "kernel-devel-4.4.180-94.147.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.4.180-94.147.1.noarch",
"product": {
"name": "kernel-macros-4.4.180-94.147.1.noarch",
"product_id": "kernel-macros-4.4.180-94.147.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.4.180-94.147.1.noarch",
"product": {
"name": "kernel-source-4.4.180-94.147.1.noarch",
"product_id": "kernel-source-4.4.180-94.147.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.4.180-94.147.1.noarch",
"product": {
"name": "kernel-docs-4.4.180-94.147.1.noarch",
"product_id": "kernel-docs-4.4.180-94.147.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.4.180-94.147.1.noarch",
"product": {
"name": "kernel-docs-html-4.4.180-94.147.1.noarch",
"product_id": "kernel-docs-html-4.4.180-94.147.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-pdf-4.4.180-94.147.1.noarch",
"product": {
"name": "kernel-docs-pdf-4.4.180-94.147.1.noarch",
"product_id": "kernel-docs-pdf-4.4.180-94.147.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.4.180-94.147.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.4.180-94.147.1.noarch",
"product_id": "kernel-source-vanilla-4.4.180-94.147.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-debug-4.4.180-94.147.1.ppc64le",
"product": {
"name": "cluster-md-kmp-debug-4.4.180-94.147.1.ppc64le",
"product_id": "cluster-md-kmp-debug-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-debug-4.4.180-94.147.1.ppc64le",
"product": {
"name": "dlm-kmp-debug-4.4.180-94.147.1.ppc64le",
"product_id": "dlm-kmp-debug-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"product_id": "dlm-kmp-default-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-debug-4.4.180-94.147.1.ppc64le",
"product": {
"name": "gfs2-kmp-debug-4.4.180-94.147.1.ppc64le",
"product_id": "gfs2-kmp-debug-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"product_id": "gfs2-kmp-default-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-debug-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-debug-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-debug-base-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-debug-devel-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-extra-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-debug-extra-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-debug-extra-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-debug-kgraft-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-debug-kgraft-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-default-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-default-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-default-base-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-default-base-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-default-devel-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-default-extra-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-default-kgraft-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-obs-build-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-obs-qa-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-syms-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-syms-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-vanilla-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-vanilla-base-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"product": {
"name": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"product_id": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-debug-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kselftests-kmp-debug-4.4.180-94.147.1.ppc64le",
"product_id": "kselftests-kmp-debug-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.4.180-94.147.1.ppc64le",
"product_id": "kselftests-kmp-default-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-debug-4.4.180-94.147.1.ppc64le",
"product": {
"name": "ocfs2-kmp-debug-4.4.180-94.147.1.ppc64le",
"product_id": "ocfs2-kmp-debug-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.4.180-94.147.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"product_id": "cluster-md-kmp-default-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.180-94.147.1.s390x",
"product": {
"name": "dlm-kmp-default-4.4.180-94.147.1.s390x",
"product_id": "dlm-kmp-default-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.180-94.147.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.4.180-94.147.1.s390x",
"product_id": "gfs2-kmp-default-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-default-4.4.180-94.147.1.s390x",
"product_id": "kernel-default-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-default-base-4.4.180-94.147.1.s390x",
"product_id": "kernel-default-base-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-default-devel-4.4.180-94.147.1.s390x",
"product_id": "kernel-default-devel-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-default-extra-4.4.180-94.147.1.s390x",
"product_id": "kernel-default-extra-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-default-kgraft-4.4.180-94.147.1.s390x",
"product_id": "kernel-default-kgraft-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-default-man-4.4.180-94.147.1.s390x",
"product_id": "kernel-default-man-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-obs-build-4.4.180-94.147.1.s390x",
"product_id": "kernel-obs-build-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-obs-qa-4.4.180-94.147.1.s390x",
"product_id": "kernel-obs-qa-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-syms-4.4.180-94.147.1.s390x",
"product_id": "kernel-syms-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-vanilla-4.4.180-94.147.1.s390x",
"product_id": "kernel-vanilla-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.4.180-94.147.1.s390x",
"product_id": "kernel-vanilla-base-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.4.180-94.147.1.s390x",
"product_id": "kernel-vanilla-devel-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.4.180-94.147.1.s390x",
"product_id": "kernel-zfcpdump-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.4.180-94.147.1.s390x",
"product": {
"name": "kselftests-kmp-default-4.4.180-94.147.1.s390x",
"product_id": "kselftests-kmp-default-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"product_id": "ocfs2-kmp-default-4.4.180-94.147.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-default-4.4.180-94.147.1.x86_64",
"product_id": "kernel-default-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-default-base-4.4.180-94.147.1.x86_64",
"product_id": "kernel-default-base-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-default-devel-4.4.180-94.147.1.x86_64",
"product_id": "kernel-default-devel-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"product_id": "kernel-default-kgraft-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-syms-4.4.180-94.147.1.x86_64",
"product_id": "kernel-syms-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"product": {
"name": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"product_id": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-debug-4.4.180-94.147.1.x86_64",
"product": {
"name": "cluster-md-kmp-debug-4.4.180-94.147.1.x86_64",
"product_id": "cluster-md-kmp-debug-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"product_id": "cluster-md-kmp-default-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-debug-4.4.180-94.147.1.x86_64",
"product": {
"name": "dlm-kmp-debug-4.4.180-94.147.1.x86_64",
"product_id": "dlm-kmp-debug-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.180-94.147.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.4.180-94.147.1.x86_64",
"product_id": "dlm-kmp-default-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-debug-4.4.180-94.147.1.x86_64",
"product": {
"name": "gfs2-kmp-debug-4.4.180-94.147.1.x86_64",
"product_id": "gfs2-kmp-debug-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"product_id": "gfs2-kmp-default-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-debug-4.4.180-94.147.1.x86_64",
"product_id": "kernel-debug-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-debug-base-4.4.180-94.147.1.x86_64",
"product_id": "kernel-debug-base-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.4.180-94.147.1.x86_64",
"product_id": "kernel-debug-devel-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-extra-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-debug-extra-4.4.180-94.147.1.x86_64",
"product_id": "kernel-debug-extra-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-debug-kgraft-4.4.180-94.147.1.x86_64",
"product_id": "kernel-debug-kgraft-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-default-extra-4.4.180-94.147.1.x86_64",
"product_id": "kernel-default-extra-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-obs-build-4.4.180-94.147.1.x86_64",
"product_id": "kernel-obs-build-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.4.180-94.147.1.x86_64",
"product_id": "kernel-obs-qa-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-vanilla-4.4.180-94.147.1.x86_64",
"product_id": "kernel-vanilla-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.4.180-94.147.1.x86_64",
"product_id": "kernel-vanilla-base-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.4.180-94.147.1.x86_64",
"product_id": "kernel-vanilla-devel-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-debug-4.4.180-94.147.1.x86_64",
"product": {
"name": "kselftests-kmp-debug-4.4.180-94.147.1.x86_64",
"product_id": "kselftests-kmp-debug-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.4.180-94.147.1.x86_64",
"product": {
"name": "kselftests-kmp-default-4.4.180-94.147.1.x86_64",
"product_id": "kselftests-kmp-default-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-debug-4.4.180-94.147.1.x86_64",
"product": {
"name": "ocfs2-kmp-debug-4.4.180-94.147.1.x86_64",
"product_id": "ocfs2-kmp-debug-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"product_id": "ocfs2-kmp-default-4.4.180-94.147.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "HPE Helion OpenStack 8",
"product": {
"name": "HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8",
"product_identification_helper": {
"cpe": "cpe:/o:suse:hpe-helion-openstack:8"
}
}
},
{
"category": "product_name",
"name": "SUSE OpenStack Cloud 8",
"product": {
"name": "SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud:8"
}
}
},
{
"category": "product_name",
"name": "SUSE OpenStack Cloud Crowbar 8",
"product": {
"name": "SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:8"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 12 SP3",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-bcl:12:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.147.1.x86_64 as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.147.1.x86_64 as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.147.1.x86_64 as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.4.180-94.147.1.x86_64 as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.180-94.147.1.noarch as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-devel-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.180-94.147.1.noarch as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-macros-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.180-94.147.1.noarch as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-source-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.147.1.x86_64 as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-syms-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64 as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.147.1.x86_64 as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.147.1.x86_64 as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.147.1.x86_64 as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.4.180-94.147.1.x86_64 as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.180-94.147.1.noarch as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-devel-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.180-94.147.1.noarch as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-macros-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.180-94.147.1.noarch as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-source-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.147.1.x86_64 as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-syms-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64 as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.147.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.147.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.147.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.4.180-94.147.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.180-94.147.1.noarch as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-devel-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.180-94.147.1.noarch as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-macros-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.180-94.147.1.noarch as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-source-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.147.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-syms-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.4.180-94.147.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.4.180-94.147.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x"
},
"product_reference": "dlm-kmp-default-4.4.180-94.147.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.4.180-94.147.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.4.180-94.147.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.4.180-94.147.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le"
},
"product_reference": "kernel-default-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le"
},
"product_reference": "kernel-default-base-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le"
},
"product_reference": "kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.180-94.147.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-devel-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.180-94.147.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-macros-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.180-94.147.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-source-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le"
},
"product_reference": "kernel-syms-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-syms-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.147.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64"
},
"product_reference": "kernel-default-4.4.180-94.147.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le"
},
"product_reference": "kernel-default-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.147.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x"
},
"product_reference": "kernel-default-4.4.180-94.147.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.147.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64"
},
"product_reference": "kernel-default-base-4.4.180-94.147.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le"
},
"product_reference": "kernel-default-base-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.147.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x"
},
"product_reference": "kernel-default-base-4.4.180-94.147.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.147.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64"
},
"product_reference": "kernel-default-devel-4.4.180-94.147.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.147.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x"
},
"product_reference": "kernel-default-devel-4.4.180-94.147.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le"
},
"product_reference": "kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.4.180-94.147.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x"
},
"product_reference": "kernel-default-man-4.4.180-94.147.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.180-94.147.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-devel-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.180-94.147.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-macros-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.180-94.147.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-source-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.147.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64"
},
"product_reference": "kernel-syms-4.4.180-94.147.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le"
},
"product_reference": "kernel-syms-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.147.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x"
},
"product_reference": "kernel-syms-4.4.180-94.147.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-syms-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.180-94.147.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-devel-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.180-94.147.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-macros-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.180-94.147.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-source-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-syms-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-24586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24586"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24586",
"url": "https://www.suse.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "moderate"
}
],
"title": "CVE-2020-24586"
},
{
"cve": "CVE-2020-24587",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24587"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24587",
"url": "https://www.suse.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1185862 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "moderate"
}
],
"title": "CVE-2020-24587"
},
{
"cve": "CVE-2020-24588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24588"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24588",
"url": "https://www.suse.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "SUSE Bug 1185861 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1192868"
},
{
"category": "external",
"summary": "SUSE Bug 1199701 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1199701"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "moderate"
}
],
"title": "CVE-2020-24588"
},
{
"cve": "CVE-2020-26139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26139"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26139",
"url": "https://www.suse.com/security/cve/CVE-2020-26139"
},
{
"category": "external",
"summary": "SUSE Bug 1186062 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "moderate"
}
],
"title": "CVE-2020-26139"
},
{
"cve": "CVE-2020-26141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26141"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26141",
"url": "https://www.suse.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "SUSE Bug 1185987 for CVE-2020-26141",
"url": "https://bugzilla.suse.com/1185987"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "moderate"
}
],
"title": "CVE-2020-26141"
},
{
"cve": "CVE-2020-26145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26145"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26145",
"url": "https://www.suse.com/security/cve/CVE-2020-26145"
},
{
"category": "external",
"summary": "SUSE Bug 1185860 for CVE-2020-26145",
"url": "https://bugzilla.suse.com/1185860"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "moderate"
}
],
"title": "CVE-2020-26145"
},
{
"cve": "CVE-2020-26147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26147"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26147",
"url": "https://www.suse.com/security/cve/CVE-2020-26147"
},
{
"category": "external",
"summary": "SUSE Bug 1233723 for CVE-2020-26147",
"url": "https://bugzilla.suse.com/1233723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "moderate"
}
],
"title": "CVE-2020-26147"
},
{
"cve": "CVE-2020-26558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26558"
}
],
"notes": [
{
"category": "general",
"text": "Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26558",
"url": "https://www.suse.com/security/cve/CVE-2020-26558"
},
{
"category": "external",
"summary": "SUSE Bug 1179610 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "moderate"
}
],
"title": "CVE-2020-26558"
},
{
"cve": "CVE-2020-36385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36385"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36385",
"url": "https://www.suse.com/security/cve/CVE-2020-36385"
},
{
"category": "external",
"summary": "SUSE Bug 1187050 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "external",
"summary": "SUSE Bug 1187052 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196914"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "important"
}
],
"title": "CVE-2020-36385"
},
{
"cve": "CVE-2020-36386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36386"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.8.1. net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36386",
"url": "https://www.suse.com/security/cve/CVE-2020-36386"
},
{
"category": "external",
"summary": "SUSE Bug 1187038 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "moderate"
}
],
"title": "CVE-2020-36386"
},
{
"cve": "CVE-2021-0129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0129"
}
],
"notes": [
{
"category": "general",
"text": "Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0129",
"url": "https://www.suse.com/security/cve/CVE-2021-0129"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2021-0129",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "moderate"
}
],
"title": "CVE-2021-0129"
},
{
"cve": "CVE-2021-0512",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0512"
}
],
"notes": [
{
"category": "general",
"text": "In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-173843328References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0512",
"url": "https://www.suse.com/security/cve/CVE-2021-0512"
},
{
"category": "external",
"summary": "SUSE Bug 1187595 for CVE-2021-0512",
"url": "https://bugzilla.suse.com/1187595"
},
{
"category": "external",
"summary": "SUSE Bug 1187597 for CVE-2021-0512",
"url": "https://bugzilla.suse.com/1187597"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "important"
}
],
"title": "CVE-2021-0512"
},
{
"cve": "CVE-2021-0605",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0605"
}
],
"notes": [
{
"category": "general",
"text": "In pfkey_dump of af_key.c, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-110373476",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0605",
"url": "https://www.suse.com/security/cve/CVE-2021-0605"
},
{
"category": "external",
"summary": "SUSE Bug 1187601 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1187601"
},
{
"category": "external",
"summary": "SUSE Bug 1187687 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1187687"
},
{
"category": "external",
"summary": "SUSE Bug 1188381 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1188381"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "important"
}
],
"title": "CVE-2021-0605"
},
{
"cve": "CVE-2021-22555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22555"
}
],
"notes": [
{
"category": "general",
"text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22555",
"url": "https://www.suse.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "SUSE Bug 1188116 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "external",
"summary": "SUSE Bug 1188117 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "external",
"summary": "SUSE Bug 1188411 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "important"
}
],
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-23134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23134"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23134",
"url": "https://www.suse.com/security/cve/CVE-2021-23134"
},
{
"category": "external",
"summary": "SUSE Bug 1186060 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "external",
"summary": "SUSE Bug 1186061 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "external",
"summary": "SUSE Bug 1220739 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1220739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "important"
}
],
"title": "CVE-2021-23134"
},
{
"cve": "CVE-2021-32399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32399"
}
],
"notes": [
{
"category": "general",
"text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32399",
"url": "https://www.suse.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "SUSE Bug 1184611 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "external",
"summary": "SUSE Bug 1185898 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "external",
"summary": "SUSE Bug 1185899 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "important"
}
],
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-33034",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33034"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33034",
"url": "https://www.suse.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "SUSE Bug 1186111 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "external",
"summary": "SUSE Bug 1186285 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "important"
}
],
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-34693",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-34693"
}
],
"notes": [
{
"category": "general",
"text": "net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-34693",
"url": "https://www.suse.com/security/cve/CVE-2021-34693"
},
{
"category": "external",
"summary": "SUSE Bug 1187452 for CVE-2021-34693",
"url": "https://bugzilla.suse.com/1187452"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2021-34693",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "moderate"
}
],
"title": "CVE-2021-34693"
},
{
"cve": "CVE-2021-3609",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3609"
}
],
"notes": [
{
"category": "general",
"text": ".A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3609",
"url": "https://www.suse.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "SUSE Bug 1187215 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "external",
"summary": "SUSE Bug 1188323 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188323"
},
{
"category": "external",
"summary": "SUSE Bug 1188720 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188720"
},
{
"category": "external",
"summary": "SUSE Bug 1190276 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1190276"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1196810"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "moderate"
}
],
"title": "CVE-2021-3609"
}
]
}
suse-su-2021:1891-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-33200: Enforcing incorrect limits for pointer arithmetic operations by the BPF verifier could be abused to perform out-of-bounds reads and writes in kernel memory (bsc#1186484).\n- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values. (bsc#1186111)\n- CVE-2020-26139: Fixed a denial-of-service when an Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. (bnc#1186062)\n- CVE-2021-23134: A Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges. (bnc#1186060)\n- CVE-2021-23133: Fixed a race condition in SCTP sockets, which could lead to privilege escalation from the context of a network service or an unprivileged process. (bnc#1184675)\n- CVE-2021-3491: Fixed a potential heap overflow in mem_rw(). This vulnerability is related to the PROVIDE_BUFFERS operation, which allowed the MAX_RW_COUNT limit to be bypassed (bsc#1185642).\n- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).\n- CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances this can be abused to inject arbitrary network packets and/or exfiltrate user data (bnc#1185859).\n- CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed (bnc#1185859 bnc#1185862).\n- CVE-2020-26147: The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments, even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used (bnc#1185859).\n- CVE-2020-26145: An issue was discovered with Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration. (bnc#1185860)\n- CVE-2020-26141: An issue was discovered in the ALFA driver for AWUS036H, where the Message Integrity Check (authenticity) of fragmented TKIP frames was not verified. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bnc#1185987)\n\nThe following non-security bugs were fixed:\n\n- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185724).\n- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185724).\n- af_packet: fix the tx skb protocol in raw sockets with ETH_P_ALL (bsc#1176081).\n- ibmvfc: Avoid move login if fast fail is enabled (bsc#1185938 ltc#192043).\n- ibmvfc: Handle move login failure (bsc#1185938 ltc#192043).\n- ibmvfc: Reinit target retries (bsc#1185938 ltc#192043).\n- kABI: Fix kABI after modifying struct __call_single_data (bsc#1180846).\n- kabi: preserve struct header_ops after bsc#1176081 fix (bsc#1176081).\n- kernel/smp: Provide CSD lock timeout diagnostics (bsc#1180846).\n- kernel/smp: add boot parameter for controlling CSD lock debugging (bsc#1180846).\n- kernel/smp: add more data to CSD lock debugging (bsc#1180846).\n- kernel/smp: make csdlock timeout depend on boot parameter (bsc#1180846).\n- kernel/smp: prepare more CSD lock debugging (bsc#1180846).\n- md/raid1: properly indicate failure when ending a failed write request (bsc#1185680).\n- net/ethernet: Add parse_protocol header_ops support (bsc#1176081).\n- net/mlx5e: Remove the wrong assumption about transport offset (bsc#1176081).\n- net/mlx5e: Trust kernel regarding transport offset (bsc#1176081).\n- net/packet: Ask driver for protocol if not provided by user (bsc#1176081).\n- net/packet: Remove redundant skb-\u003eprotocol set (bsc#1176081).\n- net: Do not set transport offset to invalid value (bsc#1176081).\n- net: Introduce parse_protocol header_ops callback (bsc#1176081).\n- netfilter: conntrack: add new sysctl to disable RST check (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: avoid misleading \u0027invalid\u0027 in log message (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: improve RST handling when tuple is re-used (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: tcp: only close if RST matches exact sequence (bsc#1183947 bsc#1185950).\n- s390/entry: save the caller of psw_idle (bsc#1185677).\n- smp: Add source and destination CPUs to __call_single_data (bsc#1180846).\n- video: hyperv_fb: Add ratelimit on error message (bsc#1185724).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-1891,SUSE-OpenStack-Cloud-9-2021-1891,SUSE-OpenStack-Cloud-Crowbar-9-2021-1891,SUSE-SLE-HA-12-SP4-2021-1891,SUSE-SLE-Live-Patching-12-SP4-2021-1891,SUSE-SLE-SAP-12-SP4-2021-1891,SUSE-SLE-SERVER-12-SP4-LTSS-2021-1891",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_1891-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:1891-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20211891-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:1891-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/008946.html"
},
{
"category": "self",
"summary": "SUSE Bug 1176081",
"url": "https://bugzilla.suse.com/1176081"
},
{
"category": "self",
"summary": "SUSE Bug 1180846",
"url": "https://bugzilla.suse.com/1180846"
},
{
"category": "self",
"summary": "SUSE Bug 1183947",
"url": "https://bugzilla.suse.com/1183947"
},
{
"category": "self",
"summary": "SUSE Bug 1184611",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "self",
"summary": "SUSE Bug 1184675",
"url": "https://bugzilla.suse.com/1184675"
},
{
"category": "self",
"summary": "SUSE Bug 1185642",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "self",
"summary": "SUSE Bug 1185677",
"url": "https://bugzilla.suse.com/1185677"
},
{
"category": "self",
"summary": "SUSE Bug 1185680",
"url": "https://bugzilla.suse.com/1185680"
},
{
"category": "self",
"summary": "SUSE Bug 1185724",
"url": "https://bugzilla.suse.com/1185724"
},
{
"category": "self",
"summary": "SUSE Bug 1185859",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "self",
"summary": "SUSE Bug 1185860",
"url": "https://bugzilla.suse.com/1185860"
},
{
"category": "self",
"summary": "SUSE Bug 1185862",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "self",
"summary": "SUSE Bug 1185863",
"url": "https://bugzilla.suse.com/1185863"
},
{
"category": "self",
"summary": "SUSE Bug 1185898",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "self",
"summary": "SUSE Bug 1185899",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "self",
"summary": "SUSE Bug 1185901",
"url": "https://bugzilla.suse.com/1185901"
},
{
"category": "self",
"summary": "SUSE Bug 1185938",
"url": "https://bugzilla.suse.com/1185938"
},
{
"category": "self",
"summary": "SUSE Bug 1185950",
"url": "https://bugzilla.suse.com/1185950"
},
{
"category": "self",
"summary": "SUSE Bug 1185987",
"url": "https://bugzilla.suse.com/1185987"
},
{
"category": "self",
"summary": "SUSE Bug 1186060",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "self",
"summary": "SUSE Bug 1186061",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "self",
"summary": "SUSE Bug 1186062",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "self",
"summary": "SUSE Bug 1186111",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "self",
"summary": "SUSE Bug 1186285",
"url": "https://bugzilla.suse.com/1186285"
},
{
"category": "self",
"summary": "SUSE Bug 1186390",
"url": "https://bugzilla.suse.com/1186390"
},
{
"category": "self",
"summary": "SUSE Bug 1186484",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "self",
"summary": "SUSE Bug 1186498",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24586 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24587 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24587/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26139 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26141 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26145 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26145/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26147 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23133 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23134 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32399 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33034 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33034/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33200 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3491 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3491/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-06-08T13:09:12Z",
"generator": {
"date": "2021-06-08T13:09:12Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:1891-1",
"initial_release_date": "2021-06-08T13:09:12Z",
"revision_history": [
{
"date": "2021-06-08T13:09:12Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-95.77.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-95.77.1.aarch64",
"product_id": "cluster-md-kmp-default-4.12.14-95.77.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-95.77.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.12.14-95.77.1.aarch64",
"product_id": "dlm-kmp-default-4.12.14-95.77.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-95.77.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.12.14-95.77.1.aarch64",
"product_id": "gfs2-kmp-default-4.12.14-95.77.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-95.77.1.aarch64",
"product": {
"name": "kernel-default-4.12.14-95.77.1.aarch64",
"product_id": "kernel-default-4.12.14-95.77.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-95.77.1.aarch64",
"product": {
"name": "kernel-default-base-4.12.14-95.77.1.aarch64",
"product_id": "kernel-default-base-4.12.14-95.77.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-95.77.1.aarch64",
"product": {
"name": "kernel-default-devel-4.12.14-95.77.1.aarch64",
"product_id": "kernel-default-devel-4.12.14-95.77.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-95.77.1.aarch64",
"product": {
"name": "kernel-default-extra-4.12.14-95.77.1.aarch64",
"product_id": "kernel-default-extra-4.12.14-95.77.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-95.77.1.aarch64",
"product": {
"name": "kernel-default-kgraft-4.12.14-95.77.1.aarch64",
"product_id": "kernel-default-kgraft-4.12.14-95.77.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-95.77.1.aarch64",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-95.77.1.aarch64",
"product_id": "kernel-default-kgraft-devel-4.12.14-95.77.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-95.77.1.aarch64",
"product": {
"name": "kernel-obs-build-4.12.14-95.77.1.aarch64",
"product_id": "kernel-obs-build-4.12.14-95.77.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-95.77.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.12.14-95.77.1.aarch64",
"product_id": "kernel-obs-qa-4.12.14-95.77.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-95.77.1.aarch64",
"product": {
"name": "kernel-syms-4.12.14-95.77.1.aarch64",
"product_id": "kernel-syms-4.12.14-95.77.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-95.77.1.aarch64",
"product": {
"name": "kernel-vanilla-4.12.14-95.77.1.aarch64",
"product_id": "kernel-vanilla-4.12.14-95.77.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-95.77.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.12.14-95.77.1.aarch64",
"product_id": "kernel-vanilla-base-4.12.14-95.77.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-95.77.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-95.77.1.aarch64",
"product_id": "kernel-vanilla-devel-4.12.14-95.77.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.77.1.aarch64",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.77.1.aarch64",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.77.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-95.77.1.aarch64",
"product": {
"name": "kselftests-kmp-default-4.12.14-95.77.1.aarch64",
"product_id": "kselftests-kmp-default-4.12.14-95.77.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-95.77.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-95.77.1.aarch64",
"product_id": "ocfs2-kmp-default-4.12.14-95.77.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.12.14-95.77.1.noarch",
"product": {
"name": "kernel-devel-4.12.14-95.77.1.noarch",
"product_id": "kernel-devel-4.12.14-95.77.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.12.14-95.77.1.noarch",
"product": {
"name": "kernel-docs-4.12.14-95.77.1.noarch",
"product_id": "kernel-docs-4.12.14-95.77.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.12.14-95.77.1.noarch",
"product": {
"name": "kernel-docs-html-4.12.14-95.77.1.noarch",
"product_id": "kernel-docs-html-4.12.14-95.77.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.12.14-95.77.1.noarch",
"product": {
"name": "kernel-macros-4.12.14-95.77.1.noarch",
"product_id": "kernel-macros-4.12.14-95.77.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.12.14-95.77.1.noarch",
"product": {
"name": "kernel-source-4.12.14-95.77.1.noarch",
"product_id": "kernel-source-4.12.14-95.77.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.12.14-95.77.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.12.14-95.77.1.noarch",
"product_id": "kernel-source-vanilla-4.12.14-95.77.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.12.14-95.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"product_id": "dlm-kmp-default-4.12.14-95.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"product_id": "gfs2-kmp-default-4.12.14-95.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-95.77.1.ppc64le",
"product": {
"name": "kernel-debug-4.12.14-95.77.1.ppc64le",
"product_id": "kernel-debug-4.12.14-95.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-95.77.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.12.14-95.77.1.ppc64le",
"product_id": "kernel-debug-base-4.12.14-95.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-95.77.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.12.14-95.77.1.ppc64le",
"product_id": "kernel-debug-devel-4.12.14-95.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-devel-4.12.14-95.77.1.ppc64le",
"product": {
"name": "kernel-debug-kgraft-devel-4.12.14-95.77.1.ppc64le",
"product_id": "kernel-debug-kgraft-devel-4.12.14-95.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-95.77.1.ppc64le",
"product": {
"name": "kernel-default-4.12.14-95.77.1.ppc64le",
"product_id": "kernel-default-4.12.14-95.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-95.77.1.ppc64le",
"product": {
"name": "kernel-default-base-4.12.14-95.77.1.ppc64le",
"product_id": "kernel-default-base-4.12.14-95.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-95.77.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.12.14-95.77.1.ppc64le",
"product_id": "kernel-default-devel-4.12.14-95.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-95.77.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.12.14-95.77.1.ppc64le",
"product_id": "kernel-default-extra-4.12.14-95.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"product_id": "kernel-default-kgraft-4.12.14-95.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"product_id": "kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-95.77.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.12.14-95.77.1.ppc64le",
"product_id": "kernel-obs-build-4.12.14-95.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-95.77.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.12.14-95.77.1.ppc64le",
"product_id": "kernel-obs-qa-4.12.14-95.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-95.77.1.ppc64le",
"product": {
"name": "kernel-syms-4.12.14-95.77.1.ppc64le",
"product_id": "kernel-syms-4.12.14-95.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-95.77.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.12.14-95.77.1.ppc64le",
"product_id": "kernel-vanilla-4.12.14-95.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-95.77.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.12.14-95.77.1.ppc64le",
"product_id": "kernel-vanilla-base-4.12.14-95.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-95.77.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.12.14-95.77.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.12.14-95.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.77.1.ppc64le",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.77.1.ppc64le",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-95.77.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.12.14-95.77.1.ppc64le",
"product_id": "kselftests-kmp-default-4.12.14-95.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.12.14-95.77.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"product_id": "cluster-md-kmp-default-4.12.14-95.77.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-95.77.1.s390x",
"product": {
"name": "dlm-kmp-default-4.12.14-95.77.1.s390x",
"product_id": "dlm-kmp-default-4.12.14-95.77.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-95.77.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.12.14-95.77.1.s390x",
"product_id": "gfs2-kmp-default-4.12.14-95.77.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-95.77.1.s390x",
"product": {
"name": "kernel-default-4.12.14-95.77.1.s390x",
"product_id": "kernel-default-4.12.14-95.77.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-95.77.1.s390x",
"product": {
"name": "kernel-default-base-4.12.14-95.77.1.s390x",
"product_id": "kernel-default-base-4.12.14-95.77.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-95.77.1.s390x",
"product": {
"name": "kernel-default-devel-4.12.14-95.77.1.s390x",
"product_id": "kernel-default-devel-4.12.14-95.77.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-95.77.1.s390x",
"product": {
"name": "kernel-default-extra-4.12.14-95.77.1.s390x",
"product_id": "kernel-default-extra-4.12.14-95.77.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-95.77.1.s390x",
"product": {
"name": "kernel-default-kgraft-4.12.14-95.77.1.s390x",
"product_id": "kernel-default-kgraft-4.12.14-95.77.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"product_id": "kernel-default-kgraft-devel-4.12.14-95.77.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.12.14-95.77.1.s390x",
"product": {
"name": "kernel-default-man-4.12.14-95.77.1.s390x",
"product_id": "kernel-default-man-4.12.14-95.77.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-95.77.1.s390x",
"product": {
"name": "kernel-obs-build-4.12.14-95.77.1.s390x",
"product_id": "kernel-obs-build-4.12.14-95.77.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-95.77.1.s390x",
"product": {
"name": "kernel-obs-qa-4.12.14-95.77.1.s390x",
"product_id": "kernel-obs-qa-4.12.14-95.77.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-95.77.1.s390x",
"product": {
"name": "kernel-syms-4.12.14-95.77.1.s390x",
"product_id": "kernel-syms-4.12.14-95.77.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-95.77.1.s390x",
"product": {
"name": "kernel-vanilla-4.12.14-95.77.1.s390x",
"product_id": "kernel-vanilla-4.12.14-95.77.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-95.77.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.12.14-95.77.1.s390x",
"product_id": "kernel-vanilla-base-4.12.14-95.77.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-95.77.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.12.14-95.77.1.s390x",
"product_id": "kernel-vanilla-devel-4.12.14-95.77.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.77.1.s390x",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.77.1.s390x",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.77.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.12.14-95.77.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.12.14-95.77.1.s390x",
"product_id": "kernel-zfcpdump-4.12.14-95.77.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-man-4.12.14-95.77.1.s390x",
"product": {
"name": "kernel-zfcpdump-man-4.12.14-95.77.1.s390x",
"product_id": "kernel-zfcpdump-man-4.12.14-95.77.1.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"product": {
"name": "kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"product_id": "kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-95.77.1.s390x",
"product": {
"name": "kselftests-kmp-default-4.12.14-95.77.1.s390x",
"product_id": "kselftests-kmp-default-4.12.14-95.77.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"product_id": "ocfs2-kmp-default-4.12.14-95.77.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"product_id": "cluster-md-kmp-default-4.12.14-95.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-95.77.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.12.14-95.77.1.x86_64",
"product_id": "dlm-kmp-default-4.12.14-95.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"product_id": "gfs2-kmp-default-4.12.14-95.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-95.77.1.x86_64",
"product": {
"name": "kernel-debug-4.12.14-95.77.1.x86_64",
"product_id": "kernel-debug-4.12.14-95.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-95.77.1.x86_64",
"product": {
"name": "kernel-debug-base-4.12.14-95.77.1.x86_64",
"product_id": "kernel-debug-base-4.12.14-95.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-95.77.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.12.14-95.77.1.x86_64",
"product_id": "kernel-debug-devel-4.12.14-95.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-devel-4.12.14-95.77.1.x86_64",
"product": {
"name": "kernel-debug-kgraft-devel-4.12.14-95.77.1.x86_64",
"product_id": "kernel-debug-kgraft-devel-4.12.14-95.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-95.77.1.x86_64",
"product": {
"name": "kernel-default-4.12.14-95.77.1.x86_64",
"product_id": "kernel-default-4.12.14-95.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-95.77.1.x86_64",
"product": {
"name": "kernel-default-base-4.12.14-95.77.1.x86_64",
"product_id": "kernel-default-base-4.12.14-95.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-95.77.1.x86_64",
"product": {
"name": "kernel-default-devel-4.12.14-95.77.1.x86_64",
"product_id": "kernel-default-devel-4.12.14-95.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-95.77.1.x86_64",
"product": {
"name": "kernel-default-extra-4.12.14-95.77.1.x86_64",
"product_id": "kernel-default-extra-4.12.14-95.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"product": {
"name": "kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"product_id": "kernel-default-kgraft-4.12.14-95.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"product_id": "kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-4.12.14-95.77.1.x86_64",
"product": {
"name": "kernel-kvmsmall-4.12.14-95.77.1.x86_64",
"product_id": "kernel-kvmsmall-4.12.14-95.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-95.77.1.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-95.77.1.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-95.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-4.12.14-95.77.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-4.12.14-95.77.1.x86_64",
"product_id": "kernel-kvmsmall-devel-4.12.14-95.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-kgraft-devel-4.12.14-95.77.1.x86_64",
"product": {
"name": "kernel-kvmsmall-kgraft-devel-4.12.14-95.77.1.x86_64",
"product_id": "kernel-kvmsmall-kgraft-devel-4.12.14-95.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-95.77.1.x86_64",
"product": {
"name": "kernel-obs-build-4.12.14-95.77.1.x86_64",
"product_id": "kernel-obs-build-4.12.14-95.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-95.77.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.12.14-95.77.1.x86_64",
"product_id": "kernel-obs-qa-4.12.14-95.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-95.77.1.x86_64",
"product": {
"name": "kernel-syms-4.12.14-95.77.1.x86_64",
"product_id": "kernel-syms-4.12.14-95.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-95.77.1.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-95.77.1.x86_64",
"product_id": "kernel-vanilla-4.12.14-95.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-95.77.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-95.77.1.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-95.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-95.77.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-95.77.1.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-95.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.77.1.x86_64",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.77.1.x86_64",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"product_id": "kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-95.77.1.x86_64",
"product": {
"name": "kselftests-kmp-default-4.12.14-95.77.1.x86_64",
"product_id": "kselftests-kmp-default-4.12.14-95.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"product_id": "ocfs2-kmp-default-4.12.14-95.77.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE OpenStack Cloud 9",
"product": {
"name": "SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud:9"
}
}
},
{
"category": "product_name",
"name": "SUSE OpenStack Cloud Crowbar 9",
"product": {
"name": "SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:9"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 12 SP4",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.77.1.x86_64 as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-95.77.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.77.1.x86_64 as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-95.77.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.77.1.x86_64 as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-95.77.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-95.77.1.noarch as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-95.77.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-95.77.1.noarch as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-95.77.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-95.77.1.noarch as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch"
},
"product_reference": "kernel-source-4.12.14-95.77.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.77.1.x86_64 as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-95.77.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.77.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-95.77.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.77.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-95.77.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.77.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-95.77.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-95.77.1.noarch as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-95.77.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-95.77.1.noarch as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-95.77.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-95.77.1.noarch as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch"
},
"product_reference": "kernel-source-4.12.14-95.77.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.77.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-95.77.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-95.77.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-95.77.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-95.77.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-95.77.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-95.77.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x"
},
"product_reference": "dlm-kmp-default-4.12.14-95.77.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-95.77.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.12.14-95.77.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-95.77.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-95.77.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.12.14-95.77.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-95.77.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-95.77.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-95.77.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-95.77.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-95.77.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le"
},
"product_reference": "kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-95.77.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x"
},
"product_reference": "kernel-default-kgraft-4.12.14-95.77.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-95.77.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64"
},
"product_reference": "kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-95.77.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.77.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-95.77.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.77.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-95.77.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.77.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-95.77.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.77.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-95.77.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.77.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-95.77.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.77.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-95.77.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-95.77.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-95.77.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-95.77.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-95.77.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-95.77.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch"
},
"product_reference": "kernel-source-4.12.14-95.77.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.77.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-95.77.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.77.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-95.77.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.77.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-95.77.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.77.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-95.77.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.77.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x"
},
"product_reference": "kernel-default-4.12.14-95.77.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.77.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-95.77.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.77.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-95.77.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.77.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-95.77.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.77.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-95.77.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.77.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-95.77.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.77.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-95.77.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.77.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-95.77.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.77.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-95.77.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.77.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-95.77.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-95.77.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-95.77.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-95.77.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-95.77.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-95.77.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-95.77.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-95.77.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch"
},
"product_reference": "kernel-source-4.12.14-95.77.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.77.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-95.77.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.77.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-95.77.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.77.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-95.77.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.77.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-95.77.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-24586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24586"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24586",
"url": "https://www.suse.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:09:12Z",
"details": "moderate"
}
],
"title": "CVE-2020-24586"
},
{
"cve": "CVE-2020-24587",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24587"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24587",
"url": "https://www.suse.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1185862 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:09:12Z",
"details": "moderate"
}
],
"title": "CVE-2020-24587"
},
{
"cve": "CVE-2020-26139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26139"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26139",
"url": "https://www.suse.com/security/cve/CVE-2020-26139"
},
{
"category": "external",
"summary": "SUSE Bug 1186062 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:09:12Z",
"details": "moderate"
}
],
"title": "CVE-2020-26139"
},
{
"cve": "CVE-2020-26141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26141"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26141",
"url": "https://www.suse.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "SUSE Bug 1185987 for CVE-2020-26141",
"url": "https://bugzilla.suse.com/1185987"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:09:12Z",
"details": "moderate"
}
],
"title": "CVE-2020-26141"
},
{
"cve": "CVE-2020-26145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26145"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26145",
"url": "https://www.suse.com/security/cve/CVE-2020-26145"
},
{
"category": "external",
"summary": "SUSE Bug 1185860 for CVE-2020-26145",
"url": "https://bugzilla.suse.com/1185860"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:09:12Z",
"details": "moderate"
}
],
"title": "CVE-2020-26145"
},
{
"cve": "CVE-2020-26147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26147"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26147",
"url": "https://www.suse.com/security/cve/CVE-2020-26147"
},
{
"category": "external",
"summary": "SUSE Bug 1233723 for CVE-2020-26147",
"url": "https://bugzilla.suse.com/1233723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:09:12Z",
"details": "moderate"
}
],
"title": "CVE-2020-26147"
},
{
"cve": "CVE-2021-23133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23133"
}
],
"notes": [
{
"category": "general",
"text": "A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23133",
"url": "https://www.suse.com/security/cve/CVE-2021-23133"
},
{
"category": "external",
"summary": "SUSE Bug 1184675 for CVE-2021-23133",
"url": "https://bugzilla.suse.com/1184675"
},
{
"category": "external",
"summary": "SUSE Bug 1185901 for CVE-2021-23133",
"url": "https://bugzilla.suse.com/1185901"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:09:12Z",
"details": "moderate"
}
],
"title": "CVE-2021-23133"
},
{
"cve": "CVE-2021-23134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23134"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23134",
"url": "https://www.suse.com/security/cve/CVE-2021-23134"
},
{
"category": "external",
"summary": "SUSE Bug 1186060 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "external",
"summary": "SUSE Bug 1186061 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "external",
"summary": "SUSE Bug 1220739 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1220739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:09:12Z",
"details": "important"
}
],
"title": "CVE-2021-23134"
},
{
"cve": "CVE-2021-32399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32399"
}
],
"notes": [
{
"category": "general",
"text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32399",
"url": "https://www.suse.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "SUSE Bug 1184611 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "external",
"summary": "SUSE Bug 1185898 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "external",
"summary": "SUSE Bug 1185899 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:09:12Z",
"details": "important"
}
],
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-33034",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33034"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33034",
"url": "https://www.suse.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "SUSE Bug 1186111 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "external",
"summary": "SUSE Bug 1186285 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:09:12Z",
"details": "important"
}
],
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-33200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33200"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-\u003ealu_limit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33200",
"url": "https://www.suse.com/security/cve/CVE-2021-33200"
},
{
"category": "external",
"summary": "SUSE Bug 1186484 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "external",
"summary": "SUSE Bug 1186498 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:09:12Z",
"details": "important"
}
],
"title": "CVE-2021-33200"
},
{
"cve": "CVE-2021-3491",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3491"
}
],
"notes": [
{
"category": "general",
"text": "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3491",
"url": "https://www.suse.com/security/cve/CVE-2021-3491"
},
{
"category": "external",
"summary": "SUSE Bug 1185642 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "external",
"summary": "SUSE Bug 1187090 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1187090"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:09:12Z",
"details": "important"
}
],
"title": "CVE-2021-3491"
}
]
}
suse-su-2021:1899-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 12 SP5 RT kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-33200: Enforcing incorrect limits for pointer arithmetic operations by the BPF verifier could be abused to perform out-of-bounds reads and writes in kernel memory (bsc#1186484).\n- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values. (bsc#1186111)\n- CVE-2020-26139: Fixed a denial-of-service when an Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. (bnc#1186062)\n- CVE-2021-23134: A Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges. (bnc#1186060)\n- CVE-2021-3491: Fixed a potential heap overflow in mem_rw(). This vulnerability is related to the PROVIDE_BUFFERS operation, which allowed the MAX_RW_COUNT limit to be bypassed (bsc#1185642).\n- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).\n- CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances this can be abused to inject arbitrary network packets and/or exfiltrate user data (bnc#1185859).\n- CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed (bnc#1185859 bnc#1185862).\n- CVE-2020-26147: The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments, even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used (bnc#1185859).\n- CVE-2020-26145: An issue was discovered with Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration. (bnc#1185860)\n- CVE-2020-26141: An issue was discovered in the ALFA driver for AWUS036H, where the Message Integrity Check (authenticity) of fragmented TKIP frames was not verified. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bnc#1185987)\n- CVE-2021-23133: Fixed a race condition in SCTP sockets, which could lead to privilege escalation from the context of a network service or an unprivileged process. (bnc#1184675)\n\nThe following non-security bugs were fixed:\n\n- ACPI: CPPC: Replace cppc_attr with kobj_attribute (git-fixes).\n- ACPICA: Enable sleep button on ACPI legacy wake (bsc#1181383).\n- ALSA: aloop: Fix initialization of controls (git-fixes).\n- ALSA: core: remove redundant spin_lock pair in snd_card_disconnect (git-fixes).\n- ALSA: usb-audio: Add error checks for usb_driver_claim_interface() calls (git-fixes).\n- ALSA: usb: midi: do not return -ENOMEM when usb_urb_ep_type_check fails (git-fixes).\n- ARM: footbridge: fix PCI interrupt mapping (git-fixes).\n- ASoC: fsl_esai: Fix TDM slot setup for I2S mode (git-fixes).\n- ASoC: intel: atom: Stop advertising non working S24LE support (git-fixes).\n- ASoC: wm8960: Fix wrong bclk and lrclk with pll enabled for some chips (git-fixes).\n- Avoid potentially erroneos RST drop (bsc#1183947).\n- Do not drop out of segments RST if tcp_be_liberal is set (bsc#1183947).\n- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185724).\n- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185724).\n- Drivers: hv: vmbus: Use after free in __vmbus_open() (git-fixes).\n- EDAC/amd64: Gather hardware information early (bsc#1180552).\n- EDAC/amd64: Make struct amd64_family_type global (bsc#1180552).\n- EDAC/amd64: Save max number of controllers to family type (bsc#1180552).\n- HID: alps: fix error return code in alps_input_configured() (git-fixes).\n- HID: plantronics: Workaround for double volume key presses (git-fixes).\n- HID: wacom: Assign boolean values to a bool variable (git-fixes).\n- HID: wacom: set EV_KEY and EV_ABS only for non-HID_GENERIC type of devices (git-fixes).\n- Input: i8042 - fix Pegatron C15B ID entry (git-fixes).\n- Input: nspire-keypad - enable interrupts only when opened (git-fixes).\n- KVM: s390: fix guarded storage control register handling (bsc#1133021).\n- NFSv4: Replace closed stateids with the \u0027invalid special stateid\u0027 (bsc#1185481).\n- PCI: Release OF node in pci_scan_device()\u0027s error path (git-fixes).\n- RDMA/hns: Delete redundant condition judgment related to eq (bsc#1104427).\n- RDMA/srpt: Fix error return code in srpt_cm_req_recv() (bsc#1103992).\n- SUNRPC in case of backlog, hand free slots directly to waiting task (bsc#1185428).\n- USB: serial: fix return value for unsupported ioctls (git-fixes).\n- USB: serial: usb_wwan: fix unprivileged TIOCCSERIAL (git-fixes).\n- af_packet: fix the tx skb protocol in raw sockets with ETH_P_ALL (bsc#1176081).\n- ata: libahci_platform: fix IRQ check (git-fixes).\n- ath9k: Fix error check in ath9k_hw_read_revisions() for PCI devices (git-fixes).\n- backlight: journada720: Fix Wmisleading-indentation warning (git-fixes).\n- batman-adv: Do not always reallocate the fragmentation skb head (git-fixes).\n- bluetooth: eliminate the potential race condition when removing the HCI controller (git-fixes).\n- bnxt_en: fix ternary sign extension bug in bnxt_show_temp() (bsc#1104745).\n- bpf: Fix masking negation logic upon negative dst register (git-fixes).\n- btrfs: fix race between transaction aborts and fsyncs leading to use-after-free (bsc#1186441).\n- btrfs: fix race when picking most recent mod log operation for an old root (bsc#1186439).\n- bus: qcom: Put child node before return (git-fixes).\n- cfg80211: remove WARN_ON() in cfg80211_sme_connect (git-fixes).\n- clk: exynos7: Mark aclk_fsys1_200 as critical (git-fixes).\n- clk: fix invalid usage of list cursor in register (git-fixes).\n- clk: fix invalid usage of list cursor in unregister (git-fixes).\n- clk: mvebu: armada-37xx-periph: Fix switching CPU freq from 250 Mhz to 1 GHz (git-fixes).\n- clk: mvebu: armada-37xx-periph: Fix workaround for switching from L1 to L0 (git-fixes).\n- clk: mvebu: armada-37xx-periph: remove .set_parent method for CPU PM clock (git-fixes).\n- clk: socfpga: fix iomem pointer cast on 64-bit (git-fixes).\n- clk: uniphier: Fix potential infinite loop (git-fixes).\n- cpufreq: Kconfig: fix documentation links (git-fixes).\n- cpufreq: intel_pstate: Add Icelake servers support in no-HWP mode (bsc#1185758).\n- crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init (git-fixes).\n- crypto: qat - Fix a double free in adf_create_ring (git-fixes).\n- crypto: qat - do not release uninitialized resources (git-fixes).\n- crypto: qat - fix error path in adf_isr_resource_alloc() (git-fixes).\n- cxgb4: Fix unintentional sign extension issues (bsc#1064802 bsc#1066129).\n- dm: fix redundant IO accounting for bios that need splitting (bsc#1183738).\n- dmaengine: dw: Make it dependent to HAS_IOMEM (git-fixes).\n- docs: kernel-parameters: Add gpio_mockup_named_lines (git-fixes).\n- docs: kernel-parameters: Move gpio-mockup for alphabetic order (git-fixes).\n- drivers: net: fix memory leak in atusb_probe (git-fixes).\n- drivers: net: fix memory leak in peak_usb_create_dev (git-fixes).\n- drm/amdkfd: fix build error with AMD_IOMMU_V2=m (git-fixes).\n- drm/i915/gvt: Fix error code in intel_gvt_init_device() (git-fixes).\n- drm/imx: imx-ldb: fix out of bounds array access warning (git-fixes).\n- drm/omap: fix misleading indentation in pixinc() (git-fixes).\n- drm/radeon: fix copy of uninitialized variable back to userspace (git-fixes).\n- e1000e: Fix duplicate include guard (git-fixes).\n- e1000e: Fix error handling in e1000_set_d0_lplu_state_82571 (git-fixes).\n- e1000e: add rtnl_lock() to e1000_reset_task (git-fixes).\n- ethernet:enic: Fix a use after free bug in enic_hard_start_xmit (bsc#1113431).\n- ftrace: Handle commands when closing set_ftrace_filter file (git-fixes).\n- genirq: Reduce irqdebug cacheline bouncing (bsc#1185703 ltc#192641).\n- gianfar: Handle error code at MAC address change (git-fixes).\n- i2c: cadence: add IRQ check (git-fixes).\n- i2c: emev2: add IRQ check (git-fixes).\n- i2c: jz4780: add IRQ check (git-fixes).\n- i40e: Added Asym_Pause to supported link modes (git-fixes).\n- i40e: Fix PHY type identifiers for 2.5G and 5G adapters (jsc#SLE-4797).\n- i40e: Fix sparse errors in i40e_txrx.c (git-fixes).\n- i40e: Fix use-after-free in i40e_client_subtask() (bsc#1101816 ).\n- i40e: fix broken XDP support (git-fixes).\n- i40e: fix the panic when running bpf in xdpdrv mode (git-fixes).\n- i40e: fix the restart auto-negotiation after FEC modified (jsc#SLE-4797).\n- ibmvfc: Avoid move login if fast fail is enabled (bsc#1185938 ltc#192043).\n- ibmvfc: Handle move login failure (bsc#1185938 ltc#192043).\n- ibmvfc: Reinit target retries (bsc#1185938 ltc#192043).\n- ibmvnic: remove default label from to_string switch (bsc#1152457 ltc#174432 git-fixes).\n- igb: Fix duplicate include guard (git-fixes).\n- igb: check timestamp validity (git-fixes).\n- ipmi/watchdog: Stop watchdog timer when the current action is \u0027none\u0027 (bsc#1184855).\n- ipw2x00: potential buffer overflow in libipw_wx_set_encodeext() (git-fixes).\n- kABI: powerpc/64: add back start_tb and accum_tb to thread_struct.\n- kabi: preserve struct header_ops after bsc#1176081 fix (bsc#1176081).\n- liquidio: Fix unintented sign extension of a left shift of a u16 (git-fixes).\n- mac80211: bail out if cipher schemes are invalid (git-fixes).\n- mac80211: clear sta-\u003efast_rx when STA removed from 4-addr VLAN (git-fixes).\n- macvlan: macvlan_count_rx() needs to be aware of preemption (git-fixes).\n- md-cluster: fix use-after-free issue when removing rdev (bsc#1184082).\n- md/raid1: properly indicate failure when ending a failed write request (bsc#1185680).\n- md: do not flush workqueue unconditionally in md_open (bsc#1184081).\n- md: factor out a mddev_find_locked helper from mddev_find (bsc#1184081).\n- md: md_open returns -EBUSY when entering racing area (bsc#1184081).\n- md: split mddev_find (bsc#1184081).\n- media: dvbdev: Fix memory leak in dvb_media_device_free() (git-fixes).\n- media: m88rs6000t: avoid potential out-of-bounds reads on arrays (git-fixes).\n- media: omap4iss: return error code when omap4iss_get() failed (git-fixes).\n- mfd: lpc_sch: Partially revert \u0027Add support for Intel Quark X1000\u0027 (git-fixes).\n- mfd: stm32-timers: Avoid clearing auto reload register (git-fixes).\n- misc: lis3lv02d: Fix false-positive WARN on various HP models (git-fixes).\n- misc: vmw_vmci: explicitly initialize vmci_datagram payload (git-fixes).\n- misc: vmw_vmci: explicitly initialize vmci_notify_bm_set_msg struct (git-fixes).\n- mlxsw: spectrum_mr: Update egress RIF list before route\u0027s action (bsc#1112374).\n- mm: mempolicy: fix potential pte_unmap_unlock pte error (bsc#1185906).\n- mm: mempolicy: make mbind() return -EIO when MPOL_MF_STRICT is specified (bsc#1185906).\n- mmc: core: Correct descriptions in mmc_of_parse() (git-fixes).\n- mmc: mmc_spi: Drop unused NO_IRQ definition (git-fixes).\n- mt7601u: fix always true expression (git-fixes).\n- mtd: require write permissions for locking and badblock ioctls (git-fixes).\n- net, xdp: Update pkt_type if generic XDP changes unicast MAC (bsc#1109837).\n- net/ethernet: Add parse_protocol header_ops support (bsc#1176081).\n- net/mlx4_en: update moderation when config reset (git-fixes).\n- net/mlx5e: Fix error path for ethtool set-priv-flag (git-fixes).\n- net/mlx5e: Remove the wrong assumption about transport offset (bsc#1176081).\n- net/mlx5e: Trust kernel regarding transport offset (bsc#1176081).\n- net/packet: Ask driver for protocol if not provided by user (bsc#1176081).\n- net/packet: Remove redundant skb-\u003eprotocol set (bsc#1176081).\n- net/qlcnic: Fix a use after free in qlcnic_83xx_get_minidump_template (git-fixes).\n- net: Do not set transport offset to invalid value (bsc#1176081).\n- net: Introduce parse_protocol header_ops callback (bsc#1176081).\n- net: hns3: Fix for geneve tx checksum bug (bsc#1104353 ).\n- net: hns3: add check for HNS3_NIC_STATE_INITED in hns3_reset_notify_up_enet() (bsc#1104353).\n- net: hns3: disable phy loopback setting in hclge_mac_start_phy (bsc#1104353).\n- net: hns3: fix for vxlan gpe tx checksum bug (bsc#1104353 ).\n- net: hns3: fix incorrect configuration for igu_egu_hw_err (bsc#1104353).\n- net: hns3: initialize the message content in hclge_get_link_mode() (bsc#1126390).\n- net: hns3: use netif_tx_disable to stop the transmit queue (bsc#1104353).\n- net: thunderx: Fix unintentional sign extension issue (git-fixes).\n- netdevice: Add missing IFF_PHONY_HEADROOM self-definition (git-fixes).\n- netfilter: conntrack: add new sysctl to disable RST check (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: avoid misleading \u0027invalid\u0027 in log message (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: improve RST handling when tuple is re-used (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: tcp: only close if RST matches exact sequence (bsc#1183947 bsc#1185950).\n- nfc: pn533: prevent potential memory corruption (git-fixes).\n- nvme-fc: clear q_live at beginning of association teardown (git-fixes).\n- nvme-loop: Introduce no merge flag for biovec (bsc#1174682).\n- pata_arasan_cf: fix IRQ check (git-fixes).\n- pata_ipx4xx_cf: fix IRQ check (git-fixes).\n- pcnet32: Use pci_resource_len to validate PCI resource (git-fixes).\n- phy: marvell: ARMADA375_USBCLUSTER_PHY should not default to y, unconditionally (git-fixes).\n- pinctrl: core: Fix kernel doc string for pin_get_name() (git-fixes).\n- pinctrl: lewisburg: Update number of pins in community (git-fixes).\n- platform/x86: pmc_atom: Match all Beckhoff Automation baytrail boards with critclk_systems DMI table (git-fixes).\n- powerpc/64: remove start_tb and accum_tb from thread_struct (bsc#1186487 ltc#177613).\n- powerpc/64s: Fix crashes when toggling entry flush barrier (bsc#1177666 git-fixes).\n- powerpc/64s: Fix crashes when toggling stf barrier (bsc#1087082 git-fixes).\n- powerpc/pseries: lparcfg calculate PURR on demand (bsc#1186487 ltc#177613).\n- regulator: bd9571mwv: Fix AVS and DVFS voltage range (git-fixes).\n- rsxx: remove extraneous \u0027const\u0027 qualifier (git-fixes).\n- rtc: ds1307: Fix wday settings for rx8130 (git-fixes).\n- rtlwifi: 8821ae: upgrade PHY and RF parameters (git-fixes).\n- s390/dasd: fix hanging DASD driver unbind (bsc#1183754 LTC#192081).\n- s390/dasd: fix hanging IO request during DASD driver unbind (bsc#1183754 LTC#192081).\n- s390/entry: save the caller of psw_idle (bsc#1185677).\n- s390/kdump: fix out-of-memory with PCI (bsc#1182256 LTC#191375).\n- sata_mv: add IRQ checks (git-fixes).\n- scsi: core: Run queue in case of I/O resource contention failure (bsc#1186416).\n- scsi: libfc: Avoid invoking response handler twice if ep is already completed (bsc#1186573).\n- scsi: lpfc: Add a option to enable interlocked ABTS before job completion (bsc#1186452).\n- scsi: lpfc: Add ndlp kref accounting for resume RPI path (bsc#1186452).\n- scsi: lpfc: Fix \u0027Unexpected timeout\u0027 error in direct attach topology (bsc#1186452).\n- scsi: lpfc: Fix Node recovery when driver is handling simultaneous PLOGIs (bsc#1186452).\n- scsi: lpfc: Fix bad memory access during VPD DUMP mailbox command (bsc#1186452).\n- scsi: lpfc: Fix crash when lpfc_sli4_hba_setup() fails to initialize the SGLs (bsc#1186452).\n- scsi: lpfc: Fix node handling for Fabric Controller and Domain Controller (bsc#1186452).\n- scsi: lpfc: Fix non-optimized ERSP handling (bsc#1186452).\n- scsi: lpfc: Fix unreleased RPIs when NPIV ports are created (bsc#1186452).\n- scsi: lpfc: Ignore GID-FT response that may be received after a link flip (bsc#1186452).\n- scsi: lpfc: Reregister FPIN types if ELS_RDF is received from fabric controller (bsc#1186452).\n- scsi: lpfc: Update lpfc version to 12.8.0.10 (bsc#1186452).\n- scsi: qla2xxx: Prevent PRLI in target mode (git-fixes).\n- smc: disallow TCP_ULP in smc_setsockopt() (bsc#1109837).\n- soc: qcom: mdt_loader: Validate that p_filesz \u0026lt; p_memsz (git-fixes).\n- spi: spi-ti-qspi: Free DMA resources (git-fixes).\n- staging: rtl8192u: Fix potential infinite loop (git-fixes).\n- tcp: fix to update snd_wl1 in bulk receiver fast path (bsc#1185827).\n- thermal/drivers/ti-soc-thermal/bandgap Remove unused variable \u0027val\u0027 (git-fixes).\n- tracing: Map all PIDs to command lines (git-fixes).\n- uio: uio_hv_generic: use devm_kzalloc() for private data alloc (git-fixes).\n- uio_hv_generic: Fix a memory leak in error handling paths (git-fixes).\n- uio_hv_generic: Fix another memory leak in error handling paths (git-fixes).\n- uio_hv_generic: add missed sysfs_remove_bin_file (git-fixes).\n- usb: core: hub: fix race condition about TRSMRCY of resume (git-fixes).\n- usb: dwc3: gadget: Fix START_TRANSFER link state check (git-fixes).\n- usb: typec: tcpci: Check ROLE_CONTROL while interpreting CC_STATUS (git-fixes).\n- usb: xhci: Increase timeout for HC halt (git-fixes).\n- video: hyperv_fb: Add ratelimit on error message (bsc#1185724).\n- xhci: Do not use GFP_KERNEL in (potentially) atomic context (git-fixes).\n- xsk: Respect device\u0027s headroom and tailroom on generic xmit path (bsc#1109837).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-1899,SUSE-SLE-RT-12-SP5-2021-1899",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_1899-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:1899-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20211899-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:1899-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/008965.html"
},
{
"category": "self",
"summary": "SUSE Bug 1064802",
"url": "https://bugzilla.suse.com/1064802"
},
{
"category": "self",
"summary": "SUSE Bug 1066129",
"url": "https://bugzilla.suse.com/1066129"
},
{
"category": "self",
"summary": "SUSE Bug 1087082",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "self",
"summary": "SUSE Bug 1101816",
"url": "https://bugzilla.suse.com/1101816"
},
{
"category": "self",
"summary": "SUSE Bug 1103992",
"url": "https://bugzilla.suse.com/1103992"
},
{
"category": "self",
"summary": "SUSE Bug 1104353",
"url": "https://bugzilla.suse.com/1104353"
},
{
"category": "self",
"summary": "SUSE Bug 1104427",
"url": "https://bugzilla.suse.com/1104427"
},
{
"category": "self",
"summary": "SUSE Bug 1104745",
"url": "https://bugzilla.suse.com/1104745"
},
{
"category": "self",
"summary": "SUSE Bug 1109837",
"url": "https://bugzilla.suse.com/1109837"
},
{
"category": "self",
"summary": "SUSE Bug 1113431",
"url": "https://bugzilla.suse.com/1113431"
},
{
"category": "self",
"summary": "SUSE Bug 1126390",
"url": "https://bugzilla.suse.com/1126390"
},
{
"category": "self",
"summary": "SUSE Bug 1133021",
"url": "https://bugzilla.suse.com/1133021"
},
{
"category": "self",
"summary": "SUSE Bug 1152457",
"url": "https://bugzilla.suse.com/1152457"
},
{
"category": "self",
"summary": "SUSE Bug 1174682",
"url": "https://bugzilla.suse.com/1174682"
},
{
"category": "self",
"summary": "SUSE Bug 1176081",
"url": "https://bugzilla.suse.com/1176081"
},
{
"category": "self",
"summary": "SUSE Bug 1177666",
"url": "https://bugzilla.suse.com/1177666"
},
{
"category": "self",
"summary": "SUSE Bug 1180552",
"url": "https://bugzilla.suse.com/1180552"
},
{
"category": "self",
"summary": "SUSE Bug 1181383",
"url": "https://bugzilla.suse.com/1181383"
},
{
"category": "self",
"summary": "SUSE Bug 1182256",
"url": "https://bugzilla.suse.com/1182256"
},
{
"category": "self",
"summary": "SUSE Bug 1183738",
"url": "https://bugzilla.suse.com/1183738"
},
{
"category": "self",
"summary": "SUSE Bug 1183947",
"url": "https://bugzilla.suse.com/1183947"
},
{
"category": "self",
"summary": "SUSE Bug 1184081",
"url": "https://bugzilla.suse.com/1184081"
},
{
"category": "self",
"summary": "SUSE Bug 1184082",
"url": "https://bugzilla.suse.com/1184082"
},
{
"category": "self",
"summary": "SUSE Bug 1184611",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "self",
"summary": "SUSE Bug 1184855",
"url": "https://bugzilla.suse.com/1184855"
},
{
"category": "self",
"summary": "SUSE Bug 1185428",
"url": "https://bugzilla.suse.com/1185428"
},
{
"category": "self",
"summary": "SUSE Bug 1185481",
"url": "https://bugzilla.suse.com/1185481"
},
{
"category": "self",
"summary": "SUSE Bug 1185680",
"url": "https://bugzilla.suse.com/1185680"
},
{
"category": "self",
"summary": "SUSE Bug 1185703",
"url": "https://bugzilla.suse.com/1185703"
},
{
"category": "self",
"summary": "SUSE Bug 1185724",
"url": "https://bugzilla.suse.com/1185724"
},
{
"category": "self",
"summary": "SUSE Bug 1185758",
"url": "https://bugzilla.suse.com/1185758"
},
{
"category": "self",
"summary": "SUSE Bug 1185827",
"url": "https://bugzilla.suse.com/1185827"
},
{
"category": "self",
"summary": "SUSE Bug 1185901",
"url": "https://bugzilla.suse.com/1185901"
},
{
"category": "self",
"summary": "SUSE Bug 1185906",
"url": "https://bugzilla.suse.com/1185906"
},
{
"category": "self",
"summary": "SUSE Bug 1185938",
"url": "https://bugzilla.suse.com/1185938"
},
{
"category": "self",
"summary": "SUSE Bug 1186060",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "self",
"summary": "SUSE Bug 1186111",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "self",
"summary": "SUSE Bug 1186390",
"url": "https://bugzilla.suse.com/1186390"
},
{
"category": "self",
"summary": "SUSE Bug 1186416",
"url": "https://bugzilla.suse.com/1186416"
},
{
"category": "self",
"summary": "SUSE Bug 1186439",
"url": "https://bugzilla.suse.com/1186439"
},
{
"category": "self",
"summary": "SUSE Bug 1186441",
"url": "https://bugzilla.suse.com/1186441"
},
{
"category": "self",
"summary": "SUSE Bug 1186452",
"url": "https://bugzilla.suse.com/1186452"
},
{
"category": "self",
"summary": "SUSE Bug 1186460",
"url": "https://bugzilla.suse.com/1186460"
},
{
"category": "self",
"summary": "SUSE Bug 1186498",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24586 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24587 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24587/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26139 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26141 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26145 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26145/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26147 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23133 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23134 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32399 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33034 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33034/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33200 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3491 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3491/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-06-08T17:29:39Z",
"generator": {
"date": "2021-06-08T17:29:39Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:1899-1",
"initial_release_date": "2021-06-08T17:29:39Z",
"revision_history": [
{
"date": "2021-06-08T17:29:39Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-rt-4.12.14-10.46.1.noarch",
"product": {
"name": "kernel-devel-rt-4.12.14-10.46.1.noarch",
"product_id": "kernel-devel-rt-4.12.14-10.46.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-rt-4.12.14-10.46.1.noarch",
"product": {
"name": "kernel-source-rt-4.12.14-10.46.1.noarch",
"product_id": "kernel-source-rt-4.12.14-10.46.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"product_id": "cluster-md-kmp-rt-4.12.14-10.46.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-rt_debug-4.12.14-10.46.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt_debug-4.12.14-10.46.1.x86_64",
"product_id": "cluster-md-kmp-rt_debug-4.12.14-10.46.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"product": {
"name": "dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"product_id": "dlm-kmp-rt-4.12.14-10.46.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt_debug-4.12.14-10.46.1.x86_64",
"product": {
"name": "dlm-kmp-rt_debug-4.12.14-10.46.1.x86_64",
"product_id": "dlm-kmp-rt_debug-4.12.14-10.46.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"product": {
"name": "gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"product_id": "gfs2-kmp-rt-4.12.14-10.46.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt_debug-4.12.14-10.46.1.x86_64",
"product": {
"name": "gfs2-kmp-rt_debug-4.12.14-10.46.1.x86_64",
"product_id": "gfs2-kmp-rt_debug-4.12.14-10.46.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-4.12.14-10.46.1.x86_64",
"product": {
"name": "kernel-rt-4.12.14-10.46.1.x86_64",
"product_id": "kernel-rt-4.12.14-10.46.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-base-4.12.14-10.46.1.x86_64",
"product": {
"name": "kernel-rt-base-4.12.14-10.46.1.x86_64",
"product_id": "kernel-rt-base-4.12.14-10.46.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-4.12.14-10.46.1.x86_64",
"product": {
"name": "kernel-rt-devel-4.12.14-10.46.1.x86_64",
"product_id": "kernel-rt-devel-4.12.14-10.46.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-extra-4.12.14-10.46.1.x86_64",
"product": {
"name": "kernel-rt-extra-4.12.14-10.46.1.x86_64",
"product_id": "kernel-rt-extra-4.12.14-10.46.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-kgraft-devel-4.12.14-10.46.1.x86_64",
"product": {
"name": "kernel-rt-kgraft-devel-4.12.14-10.46.1.x86_64",
"product_id": "kernel-rt-kgraft-devel-4.12.14-10.46.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-4.12.14-10.46.1.x86_64",
"product": {
"name": "kernel-rt_debug-4.12.14-10.46.1.x86_64",
"product_id": "kernel-rt_debug-4.12.14-10.46.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-base-4.12.14-10.46.1.x86_64",
"product": {
"name": "kernel-rt_debug-base-4.12.14-10.46.1.x86_64",
"product_id": "kernel-rt_debug-base-4.12.14-10.46.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"product": {
"name": "kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"product_id": "kernel-rt_debug-devel-4.12.14-10.46.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-extra-4.12.14-10.46.1.x86_64",
"product": {
"name": "kernel-rt_debug-extra-4.12.14-10.46.1.x86_64",
"product_id": "kernel-rt_debug-extra-4.12.14-10.46.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-kgraft-devel-4.12.14-10.46.1.x86_64",
"product": {
"name": "kernel-rt_debug-kgraft-devel-4.12.14-10.46.1.x86_64",
"product_id": "kernel-rt_debug-kgraft-devel-4.12.14-10.46.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-rt-4.12.14-10.46.1.x86_64",
"product": {
"name": "kernel-syms-rt-4.12.14-10.46.1.x86_64",
"product_id": "kernel-syms-rt-4.12.14-10.46.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt-4.12.14-10.46.1.x86_64",
"product": {
"name": "kselftests-kmp-rt-4.12.14-10.46.1.x86_64",
"product_id": "kselftests-kmp-rt-4.12.14-10.46.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt_debug-4.12.14-10.46.1.x86_64",
"product": {
"name": "kselftests-kmp-rt_debug-4.12.14-10.46.1.x86_64",
"product_id": "kselftests-kmp-rt_debug-4.12.14-10.46.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"product_id": "ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt_debug-4.12.14-10.46.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt_debug-4.12.14-10.46.1.x86_64",
"product_id": "ocfs2-kmp-rt_debug-4.12.14-10.46.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Real Time 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-linux-enterprise-rt:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-rt-4.12.14-10.46.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64"
},
"product_reference": "cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-rt-4.12.14-10.46.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64"
},
"product_reference": "dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-rt-4.12.14-10.46.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64"
},
"product_reference": "gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-rt-4.12.14-10.46.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch"
},
"product_reference": "kernel-devel-rt-4.12.14-10.46.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-4.12.14-10.46.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64"
},
"product_reference": "kernel-rt-4.12.14-10.46.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-base-4.12.14-10.46.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64"
},
"product_reference": "kernel-rt-base-4.12.14-10.46.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-4.12.14-10.46.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64"
},
"product_reference": "kernel-rt-devel-4.12.14-10.46.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-4.12.14-10.46.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64"
},
"product_reference": "kernel-rt_debug-4.12.14-10.46.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-devel-4.12.14-10.46.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64"
},
"product_reference": "kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-4.12.14-10.46.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch"
},
"product_reference": "kernel-source-rt-4.12.14-10.46.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-rt-4.12.14-10.46.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64"
},
"product_reference": "kernel-syms-rt-4.12.14-10.46.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-rt-4.12.14-10.46.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
},
"product_reference": "ocfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-24586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24586"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24586",
"url": "https://www.suse.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T17:29:39Z",
"details": "moderate"
}
],
"title": "CVE-2020-24586"
},
{
"cve": "CVE-2020-24587",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24587"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24587",
"url": "https://www.suse.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1185862 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T17:29:39Z",
"details": "moderate"
}
],
"title": "CVE-2020-24587"
},
{
"cve": "CVE-2020-26139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26139"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26139",
"url": "https://www.suse.com/security/cve/CVE-2020-26139"
},
{
"category": "external",
"summary": "SUSE Bug 1186062 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T17:29:39Z",
"details": "moderate"
}
],
"title": "CVE-2020-26139"
},
{
"cve": "CVE-2020-26141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26141"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26141",
"url": "https://www.suse.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "SUSE Bug 1185987 for CVE-2020-26141",
"url": "https://bugzilla.suse.com/1185987"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T17:29:39Z",
"details": "moderate"
}
],
"title": "CVE-2020-26141"
},
{
"cve": "CVE-2020-26145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26145"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26145",
"url": "https://www.suse.com/security/cve/CVE-2020-26145"
},
{
"category": "external",
"summary": "SUSE Bug 1185860 for CVE-2020-26145",
"url": "https://bugzilla.suse.com/1185860"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T17:29:39Z",
"details": "moderate"
}
],
"title": "CVE-2020-26145"
},
{
"cve": "CVE-2020-26147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26147"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26147",
"url": "https://www.suse.com/security/cve/CVE-2020-26147"
},
{
"category": "external",
"summary": "SUSE Bug 1233723 for CVE-2020-26147",
"url": "https://bugzilla.suse.com/1233723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T17:29:39Z",
"details": "moderate"
}
],
"title": "CVE-2020-26147"
},
{
"cve": "CVE-2021-23133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23133"
}
],
"notes": [
{
"category": "general",
"text": "A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23133",
"url": "https://www.suse.com/security/cve/CVE-2021-23133"
},
{
"category": "external",
"summary": "SUSE Bug 1184675 for CVE-2021-23133",
"url": "https://bugzilla.suse.com/1184675"
},
{
"category": "external",
"summary": "SUSE Bug 1185901 for CVE-2021-23133",
"url": "https://bugzilla.suse.com/1185901"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T17:29:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-23133"
},
{
"cve": "CVE-2021-23134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23134"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23134",
"url": "https://www.suse.com/security/cve/CVE-2021-23134"
},
{
"category": "external",
"summary": "SUSE Bug 1186060 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "external",
"summary": "SUSE Bug 1186061 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "external",
"summary": "SUSE Bug 1220739 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1220739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T17:29:39Z",
"details": "important"
}
],
"title": "CVE-2021-23134"
},
{
"cve": "CVE-2021-32399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32399"
}
],
"notes": [
{
"category": "general",
"text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32399",
"url": "https://www.suse.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "SUSE Bug 1184611 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "external",
"summary": "SUSE Bug 1185898 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "external",
"summary": "SUSE Bug 1185899 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T17:29:39Z",
"details": "important"
}
],
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-33034",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33034"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33034",
"url": "https://www.suse.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "SUSE Bug 1186111 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "external",
"summary": "SUSE Bug 1186285 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T17:29:39Z",
"details": "important"
}
],
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-33200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33200"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-\u003ealu_limit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33200",
"url": "https://www.suse.com/security/cve/CVE-2021-33200"
},
{
"category": "external",
"summary": "SUSE Bug 1186484 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "external",
"summary": "SUSE Bug 1186498 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T17:29:39Z",
"details": "important"
}
],
"title": "CVE-2021-33200"
},
{
"cve": "CVE-2021-3491",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3491"
}
],
"notes": [
{
"category": "general",
"text": "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3491",
"url": "https://www.suse.com/security/cve/CVE-2021-3491"
},
{
"category": "external",
"summary": "SUSE Bug 1185642 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "external",
"summary": "SUSE Bug 1187090 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1187090"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T17:29:39Z",
"details": "important"
}
],
"title": "CVE-2021-3491"
}
]
}
suse-su-2021:1889-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP2 RT kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-33200: Enforcing incorrect limits for pointer arithmetic operations by the BPF verifier could be abused to perform out-of-bounds reads and writes in kernel memory (bsc#1186484).\n- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values. (bsc#1186111)\n- CVE-2020-26139: Fixed a denial-of-service when an Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. (bnc#1186062)\n- CVE-2021-23134: A Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges. (bnc#1186060)\n- CVE-2021-3491: Fixed a potential heap overflow in mem_rw(). This vulnerability is related to the PROVIDE_BUFFERS operation, which allowed the MAX_RW_COUNT limit to be bypassed (bsc#1185642).\n- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).\n- CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances this can be abused to inject arbitrary network packets and/or exfiltrate user data (bnc#1185859).\n- CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed (bnc#1185859 bnc#1185862).\n- CVE-2020-26147: The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments, even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used (bnc#1185859).\n- CVE-2020-24588: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets. (bnc#1185861)\n- CVE-2020-26145: An issue was discovered with Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration. (bnc#1185860)\n- CVE-2020-26141: An issue was discovered in the ALFA driver for AWUS036H, where the Message Integrity Check (authenticity) of fragmented TKIP frames was not verified. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bnc#1185987)\n\nThe following non-security bugs were fixed:\n\n- ACPI / hotplug / PCI: Fix reference count leak in enable_slot() (git-fixes).\n- ACPI: GTDT: Do not corrupt interrupt mappings on watchdow probe failure (git-fixes).\n- ACPI: custom_method: fix a possible memory leak (git-fixes).\n- ACPI: custom_method: fix potential use-after-free issue (git-fixes).\n- ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro (git-fixes).\n- ALSA: bebob: enable to deliver MIDI messages for multiple ports (git-fixes).\n- ALSA: dice: fix stream format at middle sampling rate for Alesis iO 26 (git-fixes).\n- ALSA: dice: fix stream format for TC Electronic Konnekt Live at high sampling transfer frequency (git-fixes).\n- ALSA: firewire-lib: fix calculation for size of IR context payload (git-fixes).\n- ALSA: firewire-lib: fix check for the size of isochronous packet payload (git-fixes).\n- ALSA: hda/conexant: Re-order CX5066 quirk table entries (git-fixes).\n- ALSA: hda/realtek: ALC285 Thinkpad jack pin quirk is unreachable (git-fixes).\n- ALSA: hda/realtek: Add some CLOVE SSIDs of ALC293 (git-fixes).\n- ALSA: hda/realtek: Headphone volume is controlled by Front mixer (git-fixes).\n- ALSA: hda/realtek: reset eapd coeff to default value for alc287 (git-fixes).\n- ALSA: hda: fixup headset for ASUS GU502 laptop (git-fixes).\n- ALSA: hda: generic: change the DAC ctl name for LO+SPK or LO+HP (git-fixes).\n- ALSA: hdsp: do not disable if not enabled (git-fixes).\n- ALSA: hdspm: do not disable if not enabled (git-fixes).\n- ALSA: intel8x0: Do not update period unless prepared (git-fixes).\n- ALSA: line6: Fix racy initialization of LINE6 MIDI (git-fixes).\n- ALSA: rme9652: do not disable if not enabled (git-fixes).\n- ALSA: usb-audio: Validate MS endpoint descriptors (git-fixes).\n- ALSA: usb-audio: fix control-request direction (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix device hang with ehci-pci (git-fixes).\n- ALSA: usb-audio: scarlett2: Improve driver startup messages (git-fixes).\n- ALSA: usb-audio: scarlett2: snd_scarlett_gen2_controls_create() can be static (git-fixes).\n- ARM64: vdso32: Install vdso32 from vdso_install (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for the Chuwi Hi8 tablet (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Enable jack-detect support on Asus T100TAF (git-fixes).\n- ASoC: cs35l33: fix an error code in probe() (git-fixes).\n- ASoC: cs42l42: Regmap must use_single_read/write (git-fixes).\n- ASoC: rsnd: call rsnd_ssi_master_clk_start() from rsnd_ssi_init() (git-fixes).\n- ASoC: rsnd: core: Check convert rate in rsnd_hw_params (git-fixes).\n- ASoC: rt286: Generalize support for ALC3263 codec (git-fixes).\n- ASoC: rt286: Make RT286_SET_GPIO_* readable and writable (git-fixes).\n- Bluetooth: L2CAP: Fix handling LE modes by L2CAP_OPTIONS (git-fixes).\n- Bluetooth: SMP: Fail if remote and local public keys are identical (git-fixes).\n- Bluetooth: Set CONF_NOT_COMPLETE as l2cap_chan default (git-fixes).\n- Bluetooth: check for zapped sk before connecting (git-fixes).\n- Bluetooth: initialize skb_queue_head at l2cap_chan_create() (git-fixes).\n- Drivers: hv: vmbus: Fix Suspend-to-Idle for Generation-2 VM (git-fixes).\n- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185725).\n- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185725).\n- Drivers: hv: vmbus: Use after free in __vmbus_open() (git-fixes).\n- Input: elants_i2c - do not bind to i2c-hid compatible ACPI instantiated devices (git-fixes).\n- Input: silead - add workaround for x86 BIOS-es which bring the chip up in a stuck state (git-fixes).\n- KVM: s390: fix guarded storage control register handling (bsc#1133021).\n- Move upstreamed media fixes into sorted section\n- NFC: nci: fix memory leak in nci_allocate_device (git-fixes).\n- PCI/RCEC: Fix RCiEP device to RCEC association (git-fixes).\n- PCI: Allow VPD access for QLogic ISP2722 (git-fixes).\n- PCI: PM: Do not read power state in pci_enable_device_flags() (git-fixes).\n- PCI: Release OF node in pci_scan_device()\u0027s error path (git-fixes).\n- PCI: endpoint: Fix missing destroy_workqueue() (git-fixes).\n- PCI: iproc: Fix return value of iproc_msi_irq_domain_alloc() (git-fixes).\n- PCI: thunder: Fix compile testing (git-fixes).\n- PM / devfreq: Use more accurate returned new_freq as resume_freq (git-fixes).\n- RDMA/addr: create addr_wq with WQ_MEM_RECLAIM flag (bsc#1183346).\n- RDMA/core: create ib_cm with WQ_MEM_RECLAIM flag (bsc#1183346).\n- RDMA/hns: Delete redundant abnormal interrupt status (git-fixes).\n- RDMA/hns: Delete redundant condition judgment related to eq (git-fixes).\n- RDMA/qedr: Fix error return code in qedr_iw_connect() (jsc#SLE-8215).\n- RDMA/srpt: Fix error return code in srpt_cm_req_recv() (git-fixes).\n- SUNRPC in case of backlog, hand free slots directly to waiting task (bsc#1185428).\n- SUNRPC: More fixes for backlog congestion (bsc#1185428).\n- USB: Add LPM quirk for Lenovo ThinkPad USB-C Dock Gen2 Ethernet (git-fixes).\n- USB: Add reset-resume quirk for WD19\u0027s Realtek Hub (git-fixes).\n- USB: serial: pl2303: add support for PL2303HXN (bsc#1186320).\n- USB: serial: pl2303: fix line-speed handling on newer chips (bsc#1186320).\n- USB: serial: ti_usb_3410_5052: fix TIOCSSERIAL permission check (git-fixes).\n- USB: trancevibrator: fix control-request direction (git-fixes).\n- amdgpu: avoid incorrect %hu format string (git-fixes).\n- arm64/mm: Fix pfn_valid() for ZONE_DEVICE based memory (git-fixes).\n- arm64: Add missing ISB after invalidating TLB in __primary_switch (git-fixes).\n- arm64: avoid -Woverride-init warning (git-fixes).\n- arm64: kasan: fix page_alloc tagging with DEBUG_VIRTUAL (git-fixes).\n- arm64: kdump: update ppos when reading elfcorehdr (git-fixes).\n- arm64: kexec_file: fix memory leakage in create_dtb() when fdt_open_into() fails (git-fixes).\n- arm64: link with -z norelro for LLD or aarch64-elf (git-fixes).\n- arm64: link with -z norelro regardless of CONFIG_RELOCATABLE (git-fixes).\n- arm64: ptrace: Fix seccomp of traced syscall -1 (NO_SYSCALL) (git-fixes).\n- arm64: ptrace: Use NO_SYSCALL instead of -1 in syscall_trace_enter() (git-fixes).\n- arm64: vdso32: make vdso32 install conditional (git-fixes).\n- arm: mm: use __pfn_to_section() to get mem_section (git-fixes).\n- ata: ahci: Disable SXS for Hisilicon Kunpeng920 (git-fixes).\n- blk-iocost: ioc_pd_free() shouldn\u0027t assume irq disabled (git-fixes).\n- blk-mq: Swap two calls in blk_mq_exit_queue() (git-fixes).\n- block/genhd: use atomic_t for disk_event-\u003eblock (bsc#1185497).\n- block: Fix three kernel-doc warnings (git-fixes).\n- block: fix get_max_io_size() (git-fixes).\n- bnxt_en: Fix RX consumer index logic in the error path (git-fixes).\n- bnxt_en: fix ternary sign extension bug in bnxt_show_temp() (git-fixes).\n- bpf: Fix leakage of uninitialized bpf stack under speculation (bsc#1155518).\n- bpf: Fix masking negation logic upon negative dst register (bsc#1155518).\n- btrfs: fix race between transaction aborts and fsyncs leading to use-after-free (bsc#1186441).\n- btrfs: fix race when picking most recent mod log operation for an old root (bsc#1186439).\n- cdc-wdm: untangle a circular dependency between callback and softint (git-fixes).\n- cdrom: gdrom: deallocate struct gdrom_unit fields in remove_gdrom (git-fixes).\n- cdrom: gdrom: initialize global variable at init time (git-fixes).\n- ceph: do not clobber i_snap_caps on non-I_NEW inode (bsc#1186501).\n- ceph: fix inode leak on getattr error in __fh_to_dentry (bsc#1186501).\n- ceph: fix up error handling with snapdirs (bsc#1186501).\n- ceph: only check pool permissions for regular files (bsc#1186501).\n- cfg80211: scan: drop entry from hidden_list on overflow (git-fixes).\n- clk: socfpga: arria10: Fix memory leak of socfpga_clk on error return (git-fixes).\n- cpufreq: intel_pstate: Add Icelake servers support in no-HWP mode (bsc#1185758).\n- crypto: api - check for ERR pointers in crypto_destroy_tfm() (git-fixes).\n- crypto: mips/poly1305 - enable for all MIPS processors (git-fixes).\n- crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init (git-fixes).\n- crypto: qat - Fix a double free in adf_create_ring (git-fixes).\n- crypto: qat - do not release uninitialized resources (git-fixes).\n- crypto: qat - fix error path in adf_isr_resource_alloc() (git-fixes).\n- crypto: qat - fix unmap invalid dma address (git-fixes).\n- crypto: stm32/cryp - Fix PM reference leak on stm32-cryp.c (git-fixes).\n- crypto: stm32/hash - Fix PM reference leak on stm32-hash.c (git-fixes).\n- cxgb4: Fix unintentional sign extension issues (git-fixes).\n- dm: avoid filesystem lookup in dm_get_dev_t() (git-fixes).\n- dmaengine: dw-edma: Fix crash on loading/unloading driver (git-fixes).\n- docs: kernel-parameters: Add gpio_mockup_named_lines (git-fixes).\n- docs: kernel-parameters: Move gpio-mockup for alphabetic order (git-fixes).\n- drivers: hv: Fix whitespace errors (bsc#1185725).\n- drm/amd/display: Fix UBSAN warning for not a valid value for type \u0027_Bool\u0027 (git-fixes).\n- drm/amd/display: Fix two cursor duplication when using overlay (git-fixes).\n- drm/amd/display: Force vsync flip when reconfiguring MPCC (git-fixes).\n- drm/amd/display: Reject non-zero src_y and src_x for video planes (git-fixes).\n- drm/amd/display: fix dml prefetch validation (git-fixes).\n- drm/amd/display: fixed divide by zero kernel crash during dsc enablement (git-fixes).\n- drm/amdgpu : Fix asic reset regression issue introduce by 8f211fe8ac7c4f (git-fixes).\n- drm/amdgpu: disable 3DCGCG on picasso/raven1 to avoid compute hang (git-fixes).\n- drm/amdgpu: fix NULL pointer dereference (git-fixes).\n- drm/amdgpu: mask the xgmi number of hops reported from psp to kfd (git-fixes).\n- drm/amdkfd: Fix cat debugfs hang_hws file causes system crash bug (git-fixes).\n- drm/i915: Avoid div-by-zero on gen2 (git-fixes).\n- drm/meson: fix shutdown crash when component not probed (git-fixes).\n- drm/msm/mdp5: Configure PP_SYNC_HEIGHT to double the vtotal (git-fixes).\n- drm/msm/mdp5: Do not multiply vclk line count by 100 (git-fixes).\n- drm/radeon/dpm: Disable sclk switching on Oland when two 4K 60Hz monitors are connected (git-fixes).\n- drm/radeon: Avoid power table parsing memory leaks (git-fixes).\n- drm/radeon: Fix off-by-one power_state index heap overwrite (git-fixes).\n- drm/vkms: fix misuse of WARN_ON (git-fixes).\n- drm: Added orientation quirk for OneGX1 Pro (git-fixes).\n- ethernet:enic: Fix a use after free bug in enic_hard_start_xmit (git-fixes).\n- extcon: arizona: Fix some issues when HPDET IRQ fires after the jack has been unplugged (git-fixes).\n- extcon: arizona: Fix various races on driver unbind (git-fixes).\n- fbdev: zero-fill colormap in fbcmap.c (git-fixes).\n- firmware: arm_scpi: Prevent the ternary sign expansion bug (git-fixes).\n- fs/epoll: restore waking from ep_done_scan() (bsc#1183868).\n- ftrace: Handle commands when closing set_ftrace_filter file (git-fixes).\n- futex: Change utime parameter to be \u0027const ... *\u0027 (git-fixes).\n- futex: Do not apply time namespace adjustment on FUTEX_LOCK_PI (bsc#1164648).\n- futex: Get rid of the val2 conditional dance (git-fixes).\n- futex: Make syscall entry points less convoluted (git-fixes).\n- genirq/irqdomain: Do not try to free an interrupt that has no (git-fixes)\n- genirq: Disable interrupts for force threaded handlers (git-fixes)\n- genirq: Reduce irqdebug cacheline bouncing (bsc#1185703 ltc#192641).\n- gpio: xilinx: Correct kernel doc for xgpio_probe() (git-fixes).\n- gpiolib: acpi: Add quirk to ignore EC wakeups on Dell Venue 10 Pro 5055 (git-fixes).\n- hrtimer: Update softirq_expires_next correctly after (git-fixes)\n- hwmon: (occ) Fix poll rate limiting (git-fixes).\n- i2c: Add I2C_AQ_NO_REP_START adapter quirk (git-fixes).\n- i2c: bail out early when RDWR parameters are wrong (git-fixes).\n- i2c: i801: Do not generate an interrupt on bus reset (git-fixes).\n- i2c: s3c2410: fix possible NULL pointer deref on read message after write (git-fixes).\n- i2c: sh_mobile: Use new clock calculation formulas for RZ/G2E (git-fixes).\n- i40e: Fix PHY type identifiers for 2.5G and 5G adapters (git-fixes).\n- i40e: Fix use-after-free in i40e_client_subtask() (git-fixes).\n- i40e: fix broken XDP support (git-fixes).\n- i40e: fix the restart auto-negotiation after FEC modified (git-fixes).\n- ibmvfc: Avoid move login if fast fail is enabled (bsc#1185938 ltc#192043).\n- ibmvfc: Handle move login failure (bsc#1185938 ltc#192043).\n- ibmvfc: Reinit target retries (bsc#1185938 ltc#192043).\n- ibmvnic: remove default label from to_string switch (bsc#1152457 ltc#174432 git-fixes).\n- ics932s401: fix broken handling of errors when word reading fails (git-fixes).\n- iio: adc: ad7124: Fix missbalanced regulator enable / disable on error (git-fixes).\n- iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers (git-fixes).\n- iio: adc: ad7768-1: Fix too small buffer passed to iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: ad7793: Add missing error code in ad7793_setup() (git-fixes).\n- iio: gyro: fxas21002c: balance runtime power in error path (git-fixes).\n- iio: gyro: mpu3050: Fix reported temperature value (git-fixes).\n- iio: proximity: pulsedlight: Fix rumtime PM imbalance on error (git-fixes).\n- iio: tsl2583: Fix division by a zero lux_val (git-fixes).\n- intel_th: Consistency and off-by-one fix (git-fixes).\n- iommu/amd: Add support for map/unmap_resource (jsc#ECO-3482).\n- ipc/mqueue, msg, sem: Avoid relying on a stack reference past its expiry (bsc#1185988).\n- ipmi/watchdog: Stop watchdog timer when the current action is \u0027none\u0027 (bsc#1184855).\n- kernel-docs.spec.in: Build using an utf-8 locale. Sphinx cannot handle UTF-8 input in non-UTF-8 locale.\n- leds: lp5523: check return value of lp5xx_read and jump to cleanup code (git-fixes).\n- locking/seqlock: Tweak DEFINE_SEQLOCK() kernel doc (bsc#1176564 bsc#1162702).\n- lpfc: Decouple port_template and vport_template (bsc#185032).\n- mac80211: clear the beacon\u0027s CRC after channel switch (git-fixes).\n- md-cluster: fix use-after-free issue when removing rdev (bsc#1184082).\n- md/raid1: properly indicate failure when ending a failed write request (bsc#1185680).\n- md: do not flush workqueue unconditionally in md_open (bsc#1184081).\n- md: factor out a mddev_find_locked helper from mddev_find (bsc#1184081).\n- md: md_open returns -EBUSY when entering racing area (bsc#1184081).\n- md: split mddev_find (bsc#1184081).\n- media: adv7604: fix possible use-after-free in adv76xx_remove() (git-fixes).\n- media: drivers: media: pci: sta2x11: fix Kconfig dependency on GPIOLIB (git-fixes).\n- media: dvb-usb: fix memory leak in dvb_usb_adapter_init (git-fixes).\n- media: em28xx: fix memory leak (git-fixes).\n- media: gspca/sq905.c: fix uninitialized variable (git-fixes).\n- media: i2c: adv7511-v4l2: fix possible use-after-free in adv7511_remove() (git-fixes).\n- media: i2c: adv7842: fix possible use-after-free in adv7842_remove() (git-fixes).\n- media: i2c: tda1997: Fix possible use-after-free in tda1997x_remove() (git-fixes).\n- media: imx: capture: Return -EPIPE from __capture_legacy_try_fmt() (git-fixes).\n- media: ite-cir: check for receive overflow (git-fixes).\n- media: media/saa7164: fix saa7164_encoder_register() memory leak bugs (git-fixes).\n- media: platform: sti: Fix runtime PM imbalance in regs_show (git-fixes).\n- media: tc358743: fix possible use-after-free in tc358743_remove() (git-fixes).\n- mfd: arizona: Fix rumtime PM imbalance on error (git-fixes).\n- misc/uss720: fix memory leak in uss720_probe (git-fixes).\n- mlxsw: spectrum_mr: Update egress RIF list before route\u0027s action (git-fixes).\n- mm: memcontrol: fix cpuhotplug statistics flushing (bsc#1185606).\n- mmc: block: Update ext_csd.cache_ctrl if it was written (git-fixes).\n- mmc: core: Do a power cycle when the CMD11 fails (git-fixes).\n- mmc: core: Set read only for SD cards with permanent write protect bit (git-fixes).\n- mmc: sdhci-pci-gli: increase 1.8V regulator wait (git-fixes).\n- mmc: sdhci-pci: Add PCI IDs for Intel LKF (git-fixes).\n- mmc: sdhci-pci: Fix initialization of some SD cards for Intel BYT-based controllers (git-fixes).\n- mmc: sdhci: Check for reset prior to DMA address unmap (git-fixes).\n- net, xdp: Update pkt_type if generic XDP changes unicast MAC (git-fixes).\n- net: enetc: fix link error again (git-fixes).\n- net: hns3: Fix for geneve tx checksum bug (git-fixes).\n- net: hns3: add check for HNS3_NIC_STATE_INITED in hns3_reset_notify_up_enet() (git-fixes).\n- net: hns3: clear unnecessary reset request in hclge_reset_rebuild (git-fixes).\n- net: hns3: disable phy loopback setting in hclge_mac_start_phy (git-fixes).\n- net: hns3: fix for vxlan gpe tx checksum bug (git-fixes).\n- net: hns3: fix incorrect configuration for igu_egu_hw_err (git-fixes).\n- net: hns3: initialize the message content in hclge_get_link_mode() (git-fixes).\n- net: hns3: use netif_tx_disable to stop the transmit queue (git-fixes).\n- net: thunderx: Fix unintentional sign extension issue (git-fixes).\n- net: usb: fix memory leak in smsc75xx_bind (git-fixes).\n- net: xfrm: Localize sequence counter per network namespace (bsc#1185696).\n- net: xfrm: Use sequence counter with associated spinlock (bsc#1185696).\n- netdevice: Add missing IFF_PHONY_HEADROOM self-definition (git-fixes).\n- netfilter: conntrack: add new sysctl to disable RST check (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: avoid misleading \u0027invalid\u0027 in log message (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: improve RST handling when tuple is re-used (bsc#1183947 bsc#1185950).\n- nvme-core: add cancel tagset helpers (bsc#1183976).\n- nvme-fabrics: decode host pathing error for connect (bsc#1179827).\n- nvme-fc: check sgl supported by target (bsc#1179827).\n- nvme-fc: clear q_live at beginning of association teardown (bsc#1186479).\n- nvme-fc: return NVME_SC_HOST_ABORTED_CMD when a command has been aborted (bsc#1184259).\n- nvme-fc: set NVME_REQ_CANCELLED in nvme_fc_terminate_exchange() (bsc#1184259).\n- nvme-fc: short-circuit reconnect retries (bsc#1179827).\n- nvme-multipath: fix double initialization of ANA state (bsc#1178612, bsc#1184259).\n- nvme-multipath: reset bdev to ns head when failover (bsc#178378 bsc#1182999).\n- nvme-pci: Remove tag from process cq (git-fixes).\n- nvme-pci: Remove two-pass completions (git-fixes).\n- nvme-pci: Simplify nvme_poll_irqdisable (git-fixes).\n- nvme-pci: align io queue count with allocted nvme_queue in (git-fixes).\n- nvme-pci: avoid race between nvme_reap_pending_cqes() and nvme_poll() (git-fixes).\n- nvme-pci: dma read memory barrier for completions (git-fixes).\n- nvme-pci: fix \u0027slimmer CQ head update\u0027 (git-fixes).\n- nvme-pci: make sure write/poll_queues less or equal then cpu (git-fixes).\n- nvme-pci: remove last_sq_tail (git-fixes).\n- nvme-pci: remove volatile cqes (git-fixes).\n- nvme-pci: slimmer CQ head update (git-fixes).\n- nvme-pci: use simple suspend when a HMB is enabled (git-fixes).\n- nvme-tcp: Fix possible race of io_work and direct send (git-fixes).\n- nvme-tcp: Fix warning with CONFIG_DEBUG_PREEMPT (git-fixes).\n- nvme-tcp: add clean action for failed reconnection (bsc#1183976).\n- nvme-tcp: fix kconfig dependency warning when !CRYPTO (git-fixes).\n- nvme-tcp: fix misuse of __smp_processor_id with preemption (git-fixes).\n- nvme-tcp: fix possible hang waiting for icresp response (bsc#1179519).\n- nvme-tcp: use cancel tagset helper for tear down (bsc#1183976).\n- nvme: Fix NULL dereference for pci nvme controllers (bsc#1182378).\n- nvme: add \u0027kato\u0027 sysfs attribute (bsc#1179825).\n- nvme: add NVME_REQ_CANCELLED flag in nvme_cancel_request() (bsc#1184259).\n- nvme: define constants for identification values (git-fixes).\n- nvme: do not intialize hwmon for discovery controllers (bsc#1184259).\n- nvme: do not intialize hwmon for discovery controllers (git-fixes).\n- nvme: document nvme controller states (git-fixes).\n- nvme: explicitly update mpath disk capacity on revalidation (git-fixes).\n- nvme: expose reconnect_delay and ctrl_loss_tmo via sysfs (bsc#1182378).\n- nvme: fix controller instance leak (git-fixes).\n- nvme: fix deadlock in disconnect during scan_work and/or ana_work (git-fixes).\n- nvme: fix possible deadlock when I/O is blocked (git-fixes).\n- nvme: remove superfluous else in nvme_ctrl_loss_tmo_store (bsc#1182378).\n- nvme: retrigger ANA log update if group descriptor isn\u0027t found (git-fixes)\n- nvme: sanitize KATO setting (bsc#1179825).\n- nvme: simplify error logic in nvme_validate_ns() (bsc#1184259).\n- nvmet: fix a memory leak (git-fixes).\n- nvmet: seset ns-\u003efile when open fails (bsc#1183873).\n- nvmet: use new ana_log_size instead the old one (bsc#1184259).\n- nxp-i2c: restore includes for kABI (bsc#1185589).\n- nxp-nci: add NXP1002 id (bsc#1185589).\n- phy: phy-twl4030-usb: Fix possible use-after-free in twl4030_usb_remove() (git-fixes).\n- pinctrl: ingenic: Improve unreachable code generation (git-fixes).\n- pinctrl: samsung: use \u0027int\u0027 for register masks in Exynos (git-fixes).\n- platform/mellanox: mlxbf-tmfifo: Fix a memory barrier issue (git-fixes).\n- platform/x86: intel_pmc_core: Do not use global pmcdev in quirks (git-fixes).\n- platform/x86: thinkpad_acpi: Correct thermal sensor allocation (git-fixes).\n- posix-timers: Preserve return value in clock_adjtime32() (git-fixes)\n- power: supply: Use IRQF_ONESHOT (git-fixes).\n- power: supply: generic-adc-battery: fix possible use-after-free in gab_remove() (git-fixes).\n- power: supply: s3c_adc_battery: fix possible use-after-free in s3c_adc_bat_remove() (git-fixes).\n- powerpc/64s: Fix crashes when toggling entry flush barrier (bsc#1177666 git-fixes).\n- powerpc/64s: Fix crashes when toggling stf barrier (bsc#1087082 git-fixes).\n- qtnfmac: Fix possible buffer overflow in qtnf_event_handle_external_auth (git-fixes).\n- rtc: pcf2127: handle timestamp interrupts (bsc#1185495).\n- s390/dasd: fix hanging DASD driver unbind (bsc#1183932 LTC#192153).\n- s390/entry: save the caller of psw_idle (bsc#1185677).\n- s390/kdump: fix out-of-memory with PCI (bsc#1182257 LTC#191375).\n- sched/eas: Do not update misfit status if the task is pinned (git-fixes)\n- sched/fair: Avoid stale CPU util_est value for schedutil in (git-fixes)\n- sched/fair: Fix unfairness caused by missing load decay (git-fixes)\n- scripts/git_sort/git_sort.py: add bpf git repo\n- scsi: core: Run queue in case of I/O resource contention failure (bsc#1186416).\n- scsi: fnic: Kill \u0027exclude_id\u0027 argument to fnic_cleanup_io() (bsc#1179851).\n- scsi: libfc: Avoid invoking response handler twice if ep is already completed (bsc#1186573).\n- scsi: lpfc: Add a option to enable interlocked ABTS before job completion (bsc#1186451).\n- scsi: lpfc: Add ndlp kref accounting for resume RPI path (bsc#1186451).\n- scsi: lpfc: Fix \u0027Unexpected timeout\u0027 error in direct attach topology (bsc#1186451).\n- scsi: lpfc: Fix Node recovery when driver is handling simultaneous PLOGIs (bsc#1186451).\n- scsi: lpfc: Fix bad memory access during VPD DUMP mailbox command (bsc#1186451).\n- scsi: lpfc: Fix crash when lpfc_sli4_hba_setup() fails to initialize the SGLs (bsc#1186451).\n- scsi: lpfc: Fix node handling for Fabric Controller and Domain Controller (bsc#1186451).\n- scsi: lpfc: Fix non-optimized ERSP handling (bsc#1186451).\n- scsi: lpfc: Fix unreleased RPIs when NPIV ports are created (bsc#1186451).\n- scsi: lpfc: Ignore GID-FT response that may be received after a link flip (bsc#1186451).\n- scsi: lpfc: Reregister FPIN types if ELS_RDF is received from fabric controller (bsc#1186451).\n- scsi: lpfc: Update lpfc version to 12.8.0.10 (bsc#1186451).\n- sctp: delay auto_asconf init until binding the first addr\n- seqlock,lockdep: Fix seqcount_latch_init() (bsc#1176564 bsc#1162702).\n- serial: core: fix suspicious security_locked_down() call (git-fixes).\n- serial: core: return early on unsupported ioctls (git-fixes).\n- serial: sh-sci: Fix off-by-one error in FIFO threshold register setting (git-fixes).\n- serial: stm32: fix incorrect characters on console (git-fixes).\n- serial: stm32: fix tx_empty condition (git-fixes).\n- serial: tegra: Fix a mask operation that is always true (git-fixes).\n- smc: disallow TCP_ULP in smc_setsockopt() (git-fixes).\n- spi: ath79: always call chipselect function (git-fixes).\n- spi: ath79: remove spi-master setup and cleanup assignment (git-fixes).\n- spi: dln2: Fix reference leak to master (git-fixes).\n- spi: omap-100k: Fix reference leak to master (git-fixes).\n- spi: qup: fix PM reference leak in spi_qup_remove() (git-fixes).\n- spi: spi-fsl-dspi: Fix a resource leak in an error handling path (git-fixes).\n- staging: emxx_udc: fix loop in _nbu2ss_nuke() (git-fixes).\n- staging: iio: cdc: ad7746: avoid overwrite of num_channels (git-fixes).\n- tcp: fix to update snd_wl1 in bulk receiver fast path\n- thermal/drivers/ti-soc-thermal/bandgap Remove unused variable \u0027val\u0027 (git-fixes).\n- thunderbolt: dma_port: Fix NVM read buffer bounds and offset issue (git-fixes).\n- tracing: Map all PIDs to command lines (git-fixes).\n- tty: amiserial: fix TIOCSSERIAL permission check (git-fixes).\n- tty: fix memory leak in vc_deallocate (git-fixes).\n- tty: moxa: fix TIOCSSERIAL jiffies conversions (git-fixes).\n- tty: moxa: fix TIOCSSERIAL permission check (git-fixes).\n- uio: uio_hv_generic: use devm_kzalloc() for private data alloc (git-fixes).\n- uio_hv_generic: Fix a memory leak in error handling paths (git-fixes).\n- uio_hv_generic: Fix another memory leak in error handling paths (git-fixes).\n- uio_hv_generic: add missed sysfs_remove_bin_file (git-fixes).\n- usb: core: hub: Fix PM reference leak in usb_port_resume() (git-fixes).\n- usb: core: hub: fix race condition about TRSMRCY of resume (git-fixes).\n- usb: dwc2: Fix gadget DMA unmap direction (git-fixes).\n- usb: dwc3: gadget: Enable suspend events (git-fixes).\n- usb: dwc3: gadget: Return success always for kick transfer in ep queue (git-fixes).\n- usb: dwc3: omap: improve extcon initialization (git-fixes).\n- usb: dwc3: pci: Enable usb2-gadget-lpm-disable for Intel Merrifield (git-fixes).\n- usb: fotg210-hcd: Fix an error message (git-fixes).\n- usb: gadget/function/f_fs string table fix for multiple languages (git-fixes).\n- usb: gadget: dummy_hcd: fix gpf in gadget_setup (git-fixes).\n- usb: gadget: f_uac1: validate input parameters (git-fixes).\n- usb: gadget: f_uac2: validate input parameters (git-fixes).\n- usb: gadget: udc: renesas_usb3: Fix a race in usb3_start_pipen() (git-fixes).\n- usb: gadget: uvc: add bInterval checking for HS mode (git-fixes).\n- usb: musb: fix PM reference leak in musb_irq_work() (git-fixes).\n- usb: sl811-hcd: improve misleading indentation (git-fixes).\n- usb: webcam: Invalid size of Processing Unit Descriptor (git-fixes).\n- usb: xhci: Fix port minor revision (git-fixes).\n- usb: xhci: Increase timeout for HC halt (git-fixes).\n- vgacon: Record video mode changes with VT_RESIZEX (git-fixes).\n- video: hyperv_fb: Add ratelimit on error message (bsc#1185725).\n- vrf: fix a comment about loopback device (git-fixes).\n- watchdog/softlockup: Remove obsolete check of last reported task (bsc#1185982).\n- watchdog/softlockup: report the overall time of softlockups (bsc#1185982).\n- watchdog: explicitly update timestamp when reporting softlockup (bsc#1185982).\n- watchdog: rename __touch_watchdog() to a better descriptive name (bsc#1185982).\n- whitespace cleanup\n- wl3501_cs: Fix out-of-bounds warnings in wl3501_mgmt_join (git-fixes).\n- wl3501_cs: Fix out-of-bounds warnings in wl3501_send_pkt (git-fixes).\n- workqueue: Minor follow-ups to the rescuer destruction change (bsc#1185911).\n- workqueue: more destroy_workqueue() fixes (bsc#1185911).\n- x86/cpu: Initialize MSR_TSC_AUX if RDTSCP *or* RDPID is supported (bsc#1152489).\n- xhci: Do not use GFP_KERNEL in (potentially) atomic context (git-fixes).\n- xhci: check control context is valid before dereferencing it (git-fixes).\n- xhci: fix potential array out of bounds with several interrupters (git-fixes).\n- xsk: Respect device\u0027s headroom and tailroom on generic xmit path (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-1889,SUSE-SLE-Module-RT-15-SP2-2021-1889",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_1889-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:1889-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20211889-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:1889-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/008956.html"
},
{
"category": "self",
"summary": "SUSE Bug 1087082",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "self",
"summary": "SUSE Bug 1133021",
"url": "https://bugzilla.suse.com/1133021"
},
{
"category": "self",
"summary": "SUSE Bug 1152457",
"url": "https://bugzilla.suse.com/1152457"
},
{
"category": "self",
"summary": "SUSE Bug 1152489",
"url": "https://bugzilla.suse.com/1152489"
},
{
"category": "self",
"summary": "SUSE Bug 1155518",
"url": "https://bugzilla.suse.com/1155518"
},
{
"category": "self",
"summary": "SUSE Bug 1156395",
"url": "https://bugzilla.suse.com/1156395"
},
{
"category": "self",
"summary": "SUSE Bug 1162702",
"url": "https://bugzilla.suse.com/1162702"
},
{
"category": "self",
"summary": "SUSE Bug 1164648",
"url": "https://bugzilla.suse.com/1164648"
},
{
"category": "self",
"summary": "SUSE Bug 1176564",
"url": "https://bugzilla.suse.com/1176564"
},
{
"category": "self",
"summary": "SUSE Bug 1177666",
"url": "https://bugzilla.suse.com/1177666"
},
{
"category": "self",
"summary": "SUSE Bug 1178418",
"url": "https://bugzilla.suse.com/1178418"
},
{
"category": "self",
"summary": "SUSE Bug 1178612",
"url": "https://bugzilla.suse.com/1178612"
},
{
"category": "self",
"summary": "SUSE Bug 1179827",
"url": "https://bugzilla.suse.com/1179827"
},
{
"category": "self",
"summary": "SUSE Bug 1179851",
"url": "https://bugzilla.suse.com/1179851"
},
{
"category": "self",
"summary": "SUSE Bug 1182378",
"url": "https://bugzilla.suse.com/1182378"
},
{
"category": "self",
"summary": "SUSE Bug 1182999",
"url": "https://bugzilla.suse.com/1182999"
},
{
"category": "self",
"summary": "SUSE Bug 1183346",
"url": "https://bugzilla.suse.com/1183346"
},
{
"category": "self",
"summary": "SUSE Bug 1183868",
"url": "https://bugzilla.suse.com/1183868"
},
{
"category": "self",
"summary": "SUSE Bug 1183873",
"url": "https://bugzilla.suse.com/1183873"
},
{
"category": "self",
"summary": "SUSE Bug 1183932",
"url": "https://bugzilla.suse.com/1183932"
},
{
"category": "self",
"summary": "SUSE Bug 1183947",
"url": "https://bugzilla.suse.com/1183947"
},
{
"category": "self",
"summary": "SUSE Bug 1184081",
"url": "https://bugzilla.suse.com/1184081"
},
{
"category": "self",
"summary": "SUSE Bug 1184082",
"url": "https://bugzilla.suse.com/1184082"
},
{
"category": "self",
"summary": "SUSE Bug 1184611",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "self",
"summary": "SUSE Bug 1184855",
"url": "https://bugzilla.suse.com/1184855"
},
{
"category": "self",
"summary": "SUSE Bug 1185428",
"url": "https://bugzilla.suse.com/1185428"
},
{
"category": "self",
"summary": "SUSE Bug 1185497",
"url": "https://bugzilla.suse.com/1185497"
},
{
"category": "self",
"summary": "SUSE Bug 1185589",
"url": "https://bugzilla.suse.com/1185589"
},
{
"category": "self",
"summary": "SUSE Bug 1185606",
"url": "https://bugzilla.suse.com/1185606"
},
{
"category": "self",
"summary": "SUSE Bug 1185645",
"url": "https://bugzilla.suse.com/1185645"
},
{
"category": "self",
"summary": "SUSE Bug 1185677",
"url": "https://bugzilla.suse.com/1185677"
},
{
"category": "self",
"summary": "SUSE Bug 1185680",
"url": "https://bugzilla.suse.com/1185680"
},
{
"category": "self",
"summary": "SUSE Bug 1185696",
"url": "https://bugzilla.suse.com/1185696"
},
{
"category": "self",
"summary": "SUSE Bug 1185703",
"url": "https://bugzilla.suse.com/1185703"
},
{
"category": "self",
"summary": "SUSE Bug 1185725",
"url": "https://bugzilla.suse.com/1185725"
},
{
"category": "self",
"summary": "SUSE Bug 1185758",
"url": "https://bugzilla.suse.com/1185758"
},
{
"category": "self",
"summary": "SUSE Bug 1185859",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "self",
"summary": "SUSE Bug 1185861",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "self",
"summary": "SUSE Bug 1185863",
"url": "https://bugzilla.suse.com/1185863"
},
{
"category": "self",
"summary": "SUSE Bug 1185898",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "self",
"summary": "SUSE Bug 1185899",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "self",
"summary": "SUSE Bug 1185911",
"url": "https://bugzilla.suse.com/1185911"
},
{
"category": "self",
"summary": "SUSE Bug 1185938",
"url": "https://bugzilla.suse.com/1185938"
},
{
"category": "self",
"summary": "SUSE Bug 1185987",
"url": "https://bugzilla.suse.com/1185987"
},
{
"category": "self",
"summary": "SUSE Bug 1185988",
"url": "https://bugzilla.suse.com/1185988"
},
{
"category": "self",
"summary": "SUSE Bug 1186061",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "self",
"summary": "SUSE Bug 1186285",
"url": "https://bugzilla.suse.com/1186285"
},
{
"category": "self",
"summary": "SUSE Bug 1186320",
"url": "https://bugzilla.suse.com/1186320"
},
{
"category": "self",
"summary": "SUSE Bug 1186439",
"url": "https://bugzilla.suse.com/1186439"
},
{
"category": "self",
"summary": "SUSE Bug 1186441",
"url": "https://bugzilla.suse.com/1186441"
},
{
"category": "self",
"summary": "SUSE Bug 1186460",
"url": "https://bugzilla.suse.com/1186460"
},
{
"category": "self",
"summary": "SUSE Bug 1186498",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "self",
"summary": "SUSE Bug 1186501",
"url": "https://bugzilla.suse.com/1186501"
},
{
"category": "self",
"summary": "SUSE Bug 1186573",
"url": "https://bugzilla.suse.com/1186573"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24586 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24587 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24587/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24588 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26139 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26141 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26145 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26145/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26147 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23134 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32399 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33034 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33034/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33200 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3491 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3491/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-06-08T13:07:48Z",
"generator": {
"date": "2021-06-08T13:07:48Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:1889-1",
"initial_release_date": "2021-06-08T13:07:48Z",
"revision_history": [
{
"date": "2021-06-08T13:07:48Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-rt-5.3.18-39.1.noarch",
"product": {
"name": "kernel-devel-rt-5.3.18-39.1.noarch",
"product_id": "kernel-devel-rt-5.3.18-39.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-rt-5.3.18-39.1.noarch",
"product": {
"name": "kernel-source-rt-5.3.18-39.1.noarch",
"product_id": "kernel-source-rt-5.3.18-39.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"product_id": "cluster-md-kmp-rt-5.3.18-39.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-rt_debug-5.3.18-39.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt_debug-5.3.18-39.1.x86_64",
"product_id": "cluster-md-kmp-rt_debug-5.3.18-39.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt-5.3.18-39.1.x86_64",
"product": {
"name": "dlm-kmp-rt-5.3.18-39.1.x86_64",
"product_id": "dlm-kmp-rt-5.3.18-39.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt_debug-5.3.18-39.1.x86_64",
"product": {
"name": "dlm-kmp-rt_debug-5.3.18-39.1.x86_64",
"product_id": "dlm-kmp-rt_debug-5.3.18-39.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt-5.3.18-39.1.x86_64",
"product": {
"name": "gfs2-kmp-rt-5.3.18-39.1.x86_64",
"product_id": "gfs2-kmp-rt-5.3.18-39.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt_debug-5.3.18-39.1.x86_64",
"product": {
"name": "gfs2-kmp-rt_debug-5.3.18-39.1.x86_64",
"product_id": "gfs2-kmp-rt_debug-5.3.18-39.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-5.3.18-39.1.x86_64",
"product": {
"name": "kernel-rt-5.3.18-39.1.x86_64",
"product_id": "kernel-rt-5.3.18-39.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-5.3.18-39.1.x86_64",
"product": {
"name": "kernel-rt-devel-5.3.18-39.1.x86_64",
"product_id": "kernel-rt-devel-5.3.18-39.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-extra-5.3.18-39.1.x86_64",
"product": {
"name": "kernel-rt-extra-5.3.18-39.1.x86_64",
"product_id": "kernel-rt-extra-5.3.18-39.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-livepatch-devel-5.3.18-39.1.x86_64",
"product": {
"name": "kernel-rt-livepatch-devel-5.3.18-39.1.x86_64",
"product_id": "kernel-rt-livepatch-devel-5.3.18-39.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-5.3.18-39.1.x86_64",
"product": {
"name": "kernel-rt_debug-5.3.18-39.1.x86_64",
"product_id": "kernel-rt_debug-5.3.18-39.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"product": {
"name": "kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"product_id": "kernel-rt_debug-devel-5.3.18-39.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-extra-5.3.18-39.1.x86_64",
"product": {
"name": "kernel-rt_debug-extra-5.3.18-39.1.x86_64",
"product_id": "kernel-rt_debug-extra-5.3.18-39.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-livepatch-devel-5.3.18-39.1.x86_64",
"product": {
"name": "kernel-rt_debug-livepatch-devel-5.3.18-39.1.x86_64",
"product_id": "kernel-rt_debug-livepatch-devel-5.3.18-39.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-rt-5.3.18-39.1.x86_64",
"product": {
"name": "kernel-syms-rt-5.3.18-39.1.x86_64",
"product_id": "kernel-syms-rt-5.3.18-39.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt-5.3.18-39.1.x86_64",
"product": {
"name": "kselftests-kmp-rt-5.3.18-39.1.x86_64",
"product_id": "kselftests-kmp-rt-5.3.18-39.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt_debug-5.3.18-39.1.x86_64",
"product": {
"name": "kselftests-kmp-rt_debug-5.3.18-39.1.x86_64",
"product_id": "kselftests-kmp-rt_debug-5.3.18-39.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt-5.3.18-39.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt-5.3.18-39.1.x86_64",
"product_id": "ocfs2-kmp-rt-5.3.18-39.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt_debug-5.3.18-39.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt_debug-5.3.18-39.1.x86_64",
"product_id": "ocfs2-kmp-rt_debug-5.3.18-39.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-rt-5.3.18-39.1.x86_64",
"product": {
"name": "reiserfs-kmp-rt-5.3.18-39.1.x86_64",
"product_id": "reiserfs-kmp-rt-5.3.18-39.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-rt_debug-5.3.18-39.1.x86_64",
"product": {
"name": "reiserfs-kmp-rt_debug-5.3.18-39.1.x86_64",
"product_id": "reiserfs-kmp-rt_debug-5.3.18-39.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Real Time Module 15 SP2",
"product": {
"name": "SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-rt:15:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-rt-5.3.18-39.1.x86_64 as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64"
},
"product_reference": "cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-rt-5.3.18-39.1.x86_64 as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64"
},
"product_reference": "dlm-kmp-rt-5.3.18-39.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-rt-5.3.18-39.1.x86_64 as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64"
},
"product_reference": "gfs2-kmp-rt-5.3.18-39.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-rt-5.3.18-39.1.noarch as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch"
},
"product_reference": "kernel-devel-rt-5.3.18-39.1.noarch",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-5.3.18-39.1.x86_64 as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64"
},
"product_reference": "kernel-rt-5.3.18-39.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-5.3.18-39.1.x86_64 as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64"
},
"product_reference": "kernel-rt-devel-5.3.18-39.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-5.3.18-39.1.x86_64 as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64"
},
"product_reference": "kernel-rt_debug-5.3.18-39.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-devel-5.3.18-39.1.x86_64 as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64"
},
"product_reference": "kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-5.3.18-39.1.noarch as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch"
},
"product_reference": "kernel-source-rt-5.3.18-39.1.noarch",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-rt-5.3.18-39.1.x86_64 as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64"
},
"product_reference": "kernel-syms-rt-5.3.18-39.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-rt-5.3.18-39.1.x86_64 as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
},
"product_reference": "ocfs2-kmp-rt-5.3.18-39.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-24586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24586"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24586",
"url": "https://www.suse.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:48Z",
"details": "moderate"
}
],
"title": "CVE-2020-24586"
},
{
"cve": "CVE-2020-24587",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24587"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24587",
"url": "https://www.suse.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1185862 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:48Z",
"details": "moderate"
}
],
"title": "CVE-2020-24587"
},
{
"cve": "CVE-2020-24588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24588"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24588",
"url": "https://www.suse.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "SUSE Bug 1185861 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1192868"
},
{
"category": "external",
"summary": "SUSE Bug 1199701 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1199701"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:48Z",
"details": "moderate"
}
],
"title": "CVE-2020-24588"
},
{
"cve": "CVE-2020-26139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26139"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26139",
"url": "https://www.suse.com/security/cve/CVE-2020-26139"
},
{
"category": "external",
"summary": "SUSE Bug 1186062 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:48Z",
"details": "moderate"
}
],
"title": "CVE-2020-26139"
},
{
"cve": "CVE-2020-26141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26141"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26141",
"url": "https://www.suse.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "SUSE Bug 1185987 for CVE-2020-26141",
"url": "https://bugzilla.suse.com/1185987"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:48Z",
"details": "moderate"
}
],
"title": "CVE-2020-26141"
},
{
"cve": "CVE-2020-26145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26145"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26145",
"url": "https://www.suse.com/security/cve/CVE-2020-26145"
},
{
"category": "external",
"summary": "SUSE Bug 1185860 for CVE-2020-26145",
"url": "https://bugzilla.suse.com/1185860"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:48Z",
"details": "moderate"
}
],
"title": "CVE-2020-26145"
},
{
"cve": "CVE-2020-26147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26147"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26147",
"url": "https://www.suse.com/security/cve/CVE-2020-26147"
},
{
"category": "external",
"summary": "SUSE Bug 1233723 for CVE-2020-26147",
"url": "https://bugzilla.suse.com/1233723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:48Z",
"details": "moderate"
}
],
"title": "CVE-2020-26147"
},
{
"cve": "CVE-2021-23134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23134"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23134",
"url": "https://www.suse.com/security/cve/CVE-2021-23134"
},
{
"category": "external",
"summary": "SUSE Bug 1186060 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "external",
"summary": "SUSE Bug 1186061 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "external",
"summary": "SUSE Bug 1220739 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1220739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:48Z",
"details": "important"
}
],
"title": "CVE-2021-23134"
},
{
"cve": "CVE-2021-32399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32399"
}
],
"notes": [
{
"category": "general",
"text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32399",
"url": "https://www.suse.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "SUSE Bug 1184611 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "external",
"summary": "SUSE Bug 1185898 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "external",
"summary": "SUSE Bug 1185899 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:48Z",
"details": "important"
}
],
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-33034",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33034"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33034",
"url": "https://www.suse.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "SUSE Bug 1186111 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "external",
"summary": "SUSE Bug 1186285 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:48Z",
"details": "important"
}
],
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-33200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33200"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-\u003ealu_limit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33200",
"url": "https://www.suse.com/security/cve/CVE-2021-33200"
},
{
"category": "external",
"summary": "SUSE Bug 1186484 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "external",
"summary": "SUSE Bug 1186498 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:48Z",
"details": "important"
}
],
"title": "CVE-2021-33200"
},
{
"cve": "CVE-2021-3491",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3491"
}
],
"notes": [
{
"category": "general",
"text": "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3491",
"url": "https://www.suse.com/security/cve/CVE-2021-3491"
},
{
"category": "external",
"summary": "SUSE Bug 1185642 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "external",
"summary": "SUSE Bug 1187090 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1187090"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:48Z",
"details": "important"
}
],
"title": "CVE-2021-3491"
}
]
}
suse-su-2021:1888-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP2 Azure kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-33200: Enforcing incorrect limits for pointer arithmetic operations by the BPF verifier could be abused to perform out-of-bounds reads and writes in kernel memory (bsc#1186484).\n- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values. (bsc#1186111)\n- CVE-2020-26139: Fixed a denial-of-service when an Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. (bnc#1186062)\n- CVE-2021-23134: A Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges. (bnc#1186060)\n- CVE-2021-3491: Fixed a potential heap overflow in mem_rw(). This vulnerability is related to the PROVIDE_BUFFERS operation, which allowed the MAX_RW_COUNT limit to be bypassed (bsc#1185642).\n- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).\n- CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances this can be abused to inject arbitrary network packets and/or exfiltrate user data (bnc#1185859).\n- CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed (bnc#1185859 bnc#1185862).\n- CVE-2020-26147: The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments, even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used (bnc#1185859).\n- CVE-2020-26145: An issue was discovered with Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration. (bnc#1185860)\n- CVE-2020-26141: An issue was discovered in the ALFA driver for AWUS036H, where the Message Integrity Check (authenticity) of fragmented TKIP frames was not verified. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bnc#1185987)\n- CVE-2020-24588: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets. (bnc#1185861)\n\nThe following non-security bugs were fixed:\n\n- ACPI / hotplug / PCI: Fix reference count leak in enable_slot() (git-fixes).\n- ACPI: GTDT: Do not corrupt interrupt mappings on watchdow probe failure (git-fixes).\n- ACPI: custom_method: fix a possible memory leak (git-fixes).\n- ACPI: custom_method: fix potential use-after-free issue (git-fixes).\n- ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro (git-fixes).\n- ALSA: bebob: enable to deliver MIDI messages for multiple ports (git-fixes).\n- ALSA: dice: fix stream format at middle sampling rate for Alesis iO 26 (git-fixes).\n- ALSA: dice: fix stream format for TC Electronic Konnekt Live at high sampling transfer frequency (git-fixes).\n- ALSA: firewire-lib: fix calculation for size of IR context payload (git-fixes).\n- ALSA: firewire-lib: fix check for the size of isochronous packet payload (git-fixes).\n- ALSA: hda/conexant: Re-order CX5066 quirk table entries (git-fixes).\n- ALSA: hda/realtek: ALC285 Thinkpad jack pin quirk is unreachable (git-fixes).\n- ALSA: hda/realtek: Add some CLOVE SSIDs of ALC293 (git-fixes).\n- ALSA: hda/realtek: Headphone volume is controlled by Front mixer (git-fixes).\n- ALSA: hda/realtek: reset eapd coeff to default value for alc287 (git-fixes).\n- ALSA: hda: fixup headset for ASUS GU502 laptop (git-fixes).\n- ALSA: hda: generic: change the DAC ctl name for LO+SPK or LO+HP (git-fixes).\n- ALSA: hdsp: do not disable if not enabled (git-fixes).\n- ALSA: hdspm: do not disable if not enabled (git-fixes).\n- ALSA: intel8x0: Do not update period unless prepared (git-fixes).\n- ALSA: line6: Fix racy initialization of LINE6 MIDI (git-fixes).\n- ALSA: rme9652: do not disable if not enabled (git-fixes).\n- ALSA: usb-audio: Validate MS endpoint descriptors (git-fixes).\n- ALSA: usb-audio: fix control-request direction (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix device hang with ehci-pci (git-fixes).\n- ALSA: usb-audio: scarlett2: Improve driver startup messages (git-fixes).\n- ALSA: usb-audio: scarlett2: snd_scarlett_gen2_controls_create() can be static (git-fixes).\n- ARM64: vdso32: Install vdso32 from vdso_install (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for the Chuwi Hi8 tablet (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Enable jack-detect support on Asus T100TAF (git-fixes).\n- ASoC: cs35l33: fix an error code in probe() (git-fixes).\n- ASoC: cs42l42: Regmap must use_single_read/write (git-fixes).\n- ASoC: rsnd: call rsnd_ssi_master_clk_start() from rsnd_ssi_init() (git-fixes).\n- ASoC: rsnd: core: Check convert rate in rsnd_hw_params (git-fixes).\n- ASoC: rt286: Generalize support for ALC3263 codec (git-fixes).\n- ASoC: rt286: Make RT286_SET_GPIO_* readable and writable (git-fixes).\n- Bluetooth: L2CAP: Fix handling LE modes by L2CAP_OPTIONS (git-fixes).\n- Bluetooth: SMP: Fail if remote and local public keys are identical (git-fixes).\n- Bluetooth: Set CONF_NOT_COMPLETE as l2cap_chan default (git-fixes).\n- Bluetooth: check for zapped sk before connecting (git-fixes).\n- Bluetooth: initialize skb_queue_head at l2cap_chan_create() (git-fixes).\n- Drivers: hv: vmbus: Fix Suspend-to-Idle for Generation-2 VM (git-fixes).\n- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185725).\n- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185725).\n- Drivers: hv: vmbus: Use after free in __vmbus_open() (git-fixes).\n- Input: elants_i2c - do not bind to i2c-hid compatible ACPI instantiated devices (git-fixes).\n- Input: silead - add workaround for x86 BIOS-es which bring the chip up in a stuck state (git-fixes).\n- KVM: s390: fix guarded storage control register handling (bsc#1133021).\n- Move upstreamed media fixes into sorted section\n- NFC: nci: fix memory leak in nci_allocate_device (git-fixes).\n- PCI/RCEC: Fix RCiEP device to RCEC association (git-fixes).\n- PCI: Allow VPD access for QLogic ISP2722 (git-fixes).\n- PCI: PM: Do not read power state in pci_enable_device_flags() (git-fixes).\n- PCI: Release OF node in pci_scan_device()\u0027s error path (git-fixes).\n- PCI: endpoint: Fix missing destroy_workqueue() (git-fixes).\n- PCI: iproc: Fix return value of iproc_msi_irq_domain_alloc() (git-fixes).\n- PCI: thunder: Fix compile testing (git-fixes).\n- PM / devfreq: Use more accurate returned new_freq as resume_freq (git-fixes).\n- RDMA/addr: create addr_wq with WQ_MEM_RECLAIM flag (bsc#1183346).\n- RDMA/core: create ib_cm with WQ_MEM_RECLAIM flag (bsc#1183346).\n- RDMA/hns: Delete redundant abnormal interrupt status (git-fixes).\n- RDMA/hns: Delete redundant condition judgment related to eq (git-fixes).\n- RDMA/qedr: Fix error return code in qedr_iw_connect() (jsc#SLE-8215).\n- RDMA/srpt: Fix error return code in srpt_cm_req_recv() (git-fixes).\n- Revert \u0027arm64: vdso: Fix compilation with clang older than 8\u0027 (git-fixes).\n- Revert \u0027gdrom: fix a memory leak bug\u0027 (git-fixes).\n- Revert \u0027i3c master: fix missing destroy_workqueue() on error in i3c_master_register\u0027 (git-fixes).\n- Revert \u0027leds: lp5523: fix a missing check of return value of lp55xx_read\u0027 (git-fixes).\n- Revert 337f13046ff0 (\u0027futex: Allow FUTEX_CLOCK_REALTIME with FUTEX_WAIT op\u0027) (git-fixes).\n- SUNRPC in case of backlog, hand free slots directly to waiting task (bsc#1185428).\n- SUNRPC: More fixes for backlog congestion (bsc#1185428).\n- USB: Add LPM quirk for Lenovo ThinkPad USB-C Dock Gen2 Ethernet (git-fixes).\n- USB: Add reset-resume quirk for WD19\u0027s Realtek Hub (git-fixes).\n- USB: serial: pl2303: add support for PL2303HXN (bsc#1186320).\n- USB: serial: pl2303: fix line-speed handling on newer chips (bsc#1186320).\n- USB: serial: ti_usb_3410_5052: fix TIOCSSERIAL permission check (git-fixes).\n- USB: trancevibrator: fix control-request direction (git-fixes).\n- amdgpu: avoid incorrect %hu format string (git-fixes).\n- arm64/mm: Fix pfn_valid() for ZONE_DEVICE based memory (git-fixes).\n- arm64: Add missing ISB after invalidating TLB in __primary_switch (git-fixes).\n- arm64: avoid -Woverride-init warning (git-fixes).\n- arm64: kasan: fix page_alloc tagging with DEBUG_VIRTUAL (git-fixes).\n- arm64: kdump: update ppos when reading elfcorehdr (git-fixes).\n- arm64: kexec_file: fix memory leakage in create_dtb() when fdt_open_into() fails (git-fixes).\n- arm64: link with -z norelro for LLD or aarch64-elf (git-fixes).\n- arm64: link with -z norelro regardless of CONFIG_RELOCATABLE (git-fixes).\n- arm64: ptrace: Fix seccomp of traced syscall -1 (NO_SYSCALL) (git-fixes).\n- arm64: ptrace: Use NO_SYSCALL instead of -1 in syscall_trace_enter() (git-fixes).\n- arm64: vdso32: make vdso32 install conditional (git-fixes).\n- arm: mm: use __pfn_to_section() to get mem_section (git-fixes).\n- ata: ahci: Disable SXS for Hisilicon Kunpeng920 (git-fixes).\n- blk-iocost: ioc_pd_free() shouldn\u0027t assume irq disabled (git-fixes).\n- blk-mq: Swap two calls in blk_mq_exit_queue() (git-fixes).\n- block/genhd: use atomic_t for disk_event-\u003eblock (bsc#1185497).\n- block: Fix three kernel-doc warnings (git-fixes).\n- block: fix get_max_io_size() (git-fixes).\n- bnxt_en: Fix RX consumer index logic in the error path (git-fixes).\n- bnxt_en: fix ternary sign extension bug in bnxt_show_temp() (git-fixes).\n- bpf: Fix leakage of uninitialized bpf stack under speculation (bsc#1155518).\n- bpf: Fix masking negation logic upon negative dst register (bsc#1155518).\n- btrfs: fix race between transaction aborts and fsyncs leading to use-after-free (bsc#1186441).\n- btrfs: fix race when picking most recent mod log operation for an old root (bsc#1186439).\n- cdc-wdm: untangle a circular dependency between callback and softint (git-fixes).\n- cdrom: gdrom: deallocate struct gdrom_unit fields in remove_gdrom (git-fixes).\n- cdrom: gdrom: initialize global variable at init time (git-fixes).\n- ceph: do not clobber i_snap_caps on non-I_NEW inode (bsc#1186501).\n- ceph: fix inode leak on getattr error in __fh_to_dentry (bsc#1186501).\n- ceph: fix up error handling with snapdirs (bsc#1186501).\n- ceph: only check pool permissions for regular files (bsc#1186501).\n- cfg80211: scan: drop entry from hidden_list on overflow (git-fixes).\n- clk: socfpga: arria10: Fix memory leak of socfpga_clk on error return (git-fixes).\n- cpufreq: intel_pstate: Add Icelake servers support in no-HWP mode (bsc#1185758).\n- crypto: api - check for ERR pointers in crypto_destroy_tfm() (git-fixes).\n- crypto: mips/poly1305 - enable for all MIPS processors (git-fixes).\n- crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init (git-fixes).\n- crypto: qat - Fix a double free in adf_create_ring (git-fixes).\n- crypto: qat - do not release uninitialized resources (git-fixes).\n- crypto: qat - fix error path in adf_isr_resource_alloc() (git-fixes).\n- crypto: qat - fix unmap invalid dma address (git-fixes).\n- crypto: stm32/cryp - Fix PM reference leak on stm32-cryp.c (git-fixes).\n- crypto: stm32/hash - Fix PM reference leak on stm32-hash.c (git-fixes).\n- cxgb4: Fix unintentional sign extension issues (git-fixes).\n- dm: avoid filesystem lookup in dm_get_dev_t() (git-fixes).\n- dmaengine: dw-edma: Fix crash on loading/unloading driver (git-fixes).\n- docs: kernel-parameters: Add gpio_mockup_named_lines (git-fixes).\n- docs: kernel-parameters: Move gpio-mockup for alphabetic order (git-fixes).\n- drivers: hv: Fix whitespace errors (bsc#1185725).\n- drm/amd/display: Fix UBSAN warning for not a valid value for type \u0027_Bool\u0027 (git-fixes).\n- drm/amd/display: Fix two cursor duplication when using overlay (git-fixes).\n- drm/amd/display: Force vsync flip when reconfiguring MPCC (git-fixes).\n- drm/amd/display: Reject non-zero src_y and src_x for video planes (git-fixes).\n- drm/amd/display: fix dml prefetch validation (git-fixes).\n- drm/amd/display: fixed divide by zero kernel crash during dsc enablement (git-fixes).\n- drm/amdgpu : Fix asic reset regression issue introduce by 8f211fe8ac7c4f (git-fixes).\n- drm/amdgpu: disable 3DCGCG on picasso/raven1 to avoid compute hang (git-fixes).\n- drm/amdgpu: fix NULL pointer dereference (git-fixes).\n- drm/amdgpu: mask the xgmi number of hops reported from psp to kfd (git-fixes).\n- drm/amdkfd: Fix cat debugfs hang_hws file causes system crash bug (git-fixes).\n- drm/i915: Avoid div-by-zero on gen2 (git-fixes).\n- drm/meson: fix shutdown crash when component not probed (git-fixes).\n- drm/msm/mdp5: Configure PP_SYNC_HEIGHT to double the vtotal (git-fixes).\n- drm/msm/mdp5: Do not multiply vclk line count by 100 (git-fixes).\n- drm/radeon/dpm: Disable sclk switching on Oland when two 4K 60Hz monitors are connected (git-fixes).\n- drm/radeon: Avoid power table parsing memory leaks (git-fixes).\n- drm/radeon: Fix off-by-one power_state index heap overwrite (git-fixes).\n- drm/vkms: fix misuse of WARN_ON (git-fixes).\n- drm: Added orientation quirk for OneGX1 Pro (git-fixes).\n- ethernet:enic: Fix a use after free bug in enic_hard_start_xmit (git-fixes).\n- extcon: arizona: Fix some issues when HPDET IRQ fires after the jack has been unplugged (git-fixes).\n- extcon: arizona: Fix various races on driver unbind (git-fixes).\n- fbdev: zero-fill colormap in fbcmap.c (git-fixes).\n- firmware: arm_scpi: Prevent the ternary sign expansion bug (git-fixes).\n- fs/epoll: restore waking from ep_done_scan() (bsc#1183868).\n- ftrace: Handle commands when closing set_ftrace_filter file (git-fixes).\n- futex: Change utime parameter to be \u0027const ... *\u0027 (git-fixes).\n- futex: Do not apply time namespace adjustment on FUTEX_LOCK_PI (bsc#1164648).\n- futex: Get rid of the val2 conditional dance (git-fixes).\n- futex: Make syscall entry points less convoluted (git-fixes).\n- genirq/irqdomain: Do not try to free an interrupt that has no (git-fixes)\n- genirq: Disable interrupts for force threaded handlers (git-fixes)\n- genirq: Reduce irqdebug cacheline bouncing (bsc#1185703 ltc#192641).\n- gpio: xilinx: Correct kernel doc for xgpio_probe() (git-fixes).\n- gpiolib: acpi: Add quirk to ignore EC wakeups on Dell Venue 10 Pro 5055 (git-fixes).\n- hrtimer: Update softirq_expires_next correctly after (git-fixes)\n- hwmon: (occ) Fix poll rate limiting (git-fixes).\n- i2c: Add I2C_AQ_NO_REP_START adapter quirk (git-fixes).\n- i2c: bail out early when RDWR parameters are wrong (git-fixes).\n- i2c: i801: Do not generate an interrupt on bus reset (git-fixes).\n- i2c: s3c2410: fix possible NULL pointer deref on read message after write (git-fixes).\n- i2c: sh_mobile: Use new clock calculation formulas for RZ/G2E (git-fixes).\n- i40e: Fix PHY type identifiers for 2.5G and 5G adapters (git-fixes).\n- i40e: Fix use-after-free in i40e_client_subtask() (git-fixes).\n- i40e: fix broken XDP support (git-fixes).\n- i40e: fix the restart auto-negotiation after FEC modified (git-fixes).\n- ibmvfc: Avoid move login if fast fail is enabled (bsc#1185938 ltc#192043).\n- ibmvfc: Handle move login failure (bsc#1185938 ltc#192043).\n- ibmvfc: Reinit target retries (bsc#1185938 ltc#192043).\n- ibmvnic: remove default label from to_string switch (bsc#1152457 ltc#174432 git-fixes).\n- ics932s401: fix broken handling of errors when word reading fails (git-fixes).\n- iio: adc: ad7124: Fix missbalanced regulator enable / disable on error (git-fixes).\n- iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers (git-fixes).\n- iio: adc: ad7768-1: Fix too small buffer passed to iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: ad7793: Add missing error code in ad7793_setup() (git-fixes).\n- iio: gyro: fxas21002c: balance runtime power in error path (git-fixes).\n- iio: gyro: mpu3050: Fix reported temperature value (git-fixes).\n- iio: proximity: pulsedlight: Fix rumtime PM imbalance on error (git-fixes).\n- iio: tsl2583: Fix division by a zero lux_val (git-fixes).\n- intel_th: Consistency and off-by-one fix (git-fixes).\n- iommu/amd: Add support for map/unmap_resource (jsc#ECO-3482).\n- ipc/mqueue, msg, sem: Avoid relying on a stack reference past its expiry (bsc#1185988).\n- ipmi/watchdog: Stop watchdog timer when the current action is \u0027none\u0027 (bsc#1184855).\n- kernel-docs.spec.in: Build using an utf-8 locale. Sphinx cannot handle UTF-8 input in non-UTF-8 locale.\n- leds: lp5523: check return value of lp5xx_read and jump to cleanup code (git-fixes).\n- lpfc: Decouple port_template and vport_template (bsc#185032).\n- mac80211: clear the beacon\u0027s CRC after channel switch (git-fixes).\n- md-cluster: fix use-after-free issue when removing rdev (bsc#1184082).\n- md/raid1: properly indicate failure when ending a failed write request (bsc#1185680).\n- md: do not flush workqueue unconditionally in md_open (bsc#1184081).\n- md: factor out a mddev_find_locked helper from mddev_find (bsc#1184081).\n- md: md_open returns -EBUSY when entering racing area (bsc#1184081).\n- md: split mddev_find (bsc#1184081).\n- media: adv7604: fix possible use-after-free in adv76xx_remove() (git-fixes).\n- media: drivers: media: pci: sta2x11: fix Kconfig dependency on GPIOLIB (git-fixes).\n- media: dvb-usb: fix memory leak in dvb_usb_adapter_init (git-fixes).\n- media: em28xx: fix memory leak (git-fixes).\n- media: gspca/sq905.c: fix uninitialized variable (git-fixes).\n- media: i2c: adv7511-v4l2: fix possible use-after-free in adv7511_remove() (git-fixes).\n- media: i2c: adv7842: fix possible use-after-free in adv7842_remove() (git-fixes).\n- media: i2c: tda1997: Fix possible use-after-free in tda1997x_remove() (git-fixes).\n- media: imx: capture: Return -EPIPE from __capture_legacy_try_fmt() (git-fixes).\n- media: ite-cir: check for receive overflow (git-fixes).\n- media: media/saa7164: fix saa7164_encoder_register() memory leak bugs (git-fixes).\n- media: platform: sti: Fix runtime PM imbalance in regs_show (git-fixes).\n- media: tc358743: fix possible use-after-free in tc358743_remove() (git-fixes).\n- mfd: arizona: Fix rumtime PM imbalance on error (git-fixes).\n- misc/uss720: fix memory leak in uss720_probe (git-fixes).\n- mlxsw: spectrum_mr: Update egress RIF list before route\u0027s action (git-fixes).\n- mm: memcontrol: fix cpuhotplug statistics flushing (bsc#1185606).\n- mmc: block: Update ext_csd.cache_ctrl if it was written (git-fixes).\n- mmc: core: Do a power cycle when the CMD11 fails (git-fixes).\n- mmc: core: Set read only for SD cards with permanent write protect bit (git-fixes).\n- mmc: sdhci-pci-gli: increase 1.8V regulator wait (git-fixes).\n- mmc: sdhci-pci: Add PCI IDs for Intel LKF (git-fixes).\n- mmc: sdhci-pci: Fix initialization of some SD cards for Intel BYT-based controllers (git-fixes).\n- mmc: sdhci: Check for reset prior to DMA address unmap (git-fixes).\n- net, xdp: Update pkt_type if generic XDP changes unicast MAC (git-fixes).\n- net: enetc: fix link error again (git-fixes).\n- net: hns3: Fix for geneve tx checksum bug (git-fixes).\n- net: hns3: add check for HNS3_NIC_STATE_INITED in hns3_reset_notify_up_enet() (git-fixes).\n- net: hns3: clear unnecessary reset request in hclge_reset_rebuild (git-fixes).\n- net: hns3: disable phy loopback setting in hclge_mac_start_phy (git-fixes).\n- net: hns3: fix for vxlan gpe tx checksum bug (git-fixes).\n- net: hns3: fix incorrect configuration for igu_egu_hw_err (git-fixes).\n- net: hns3: initialize the message content in hclge_get_link_mode() (git-fixes).\n- net: hns3: use netif_tx_disable to stop the transmit queue (git-fixes).\n- net: thunderx: Fix unintentional sign extension issue (git-fixes).\n- net: usb: fix memory leak in smsc75xx_bind (git-fixes).\n- netdevice: Add missing IFF_PHONY_HEADROOM self-definition (git-fixes).\n- netfilter: conntrack: add new sysctl to disable RST check (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: avoid misleading \u0027invalid\u0027 in log message (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: improve RST handling when tuple is re-used (bsc#1183947 bsc#1185950).\n- nvme-core: add cancel tagset helpers (bsc#1183976).\n- nvme-fabrics: decode host pathing error for connect (bsc#1179827).\n- nvme-fc: check sgl supported by target (bsc#1179827).\n- nvme-fc: clear q_live at beginning of association teardown (bsc#1186479).\n- nvme-fc: return NVME_SC_HOST_ABORTED_CMD when a command has been aborted (bsc#1184259).\n- nvme-fc: set NVME_REQ_CANCELLED in nvme_fc_terminate_exchange() (bsc#1184259).\n- nvme-fc: short-circuit reconnect retries (bsc#1179827).\n- nvme-multipath: fix double initialization of ANA state (bsc#1178612, bsc#1184259).\n- nvme-multipath: reset bdev to ns head when failover (bsc#178378 bsc#1182999).\n- nvme-pci: Remove tag from process cq (git-fixes).\n- nvme-pci: Remove two-pass completions (git-fixes).\n- nvme-pci: Simplify nvme_poll_irqdisable (git-fixes).\n- nvme-pci: align io queue count with allocted nvme_queue in (git-fixes).\n- nvme-pci: avoid race between nvme_reap_pending_cqes() and nvme_poll() (git-fixes).\n- nvme-pci: dma read memory barrier for completions (git-fixes).\n- nvme-pci: fix \u0027slimmer CQ head update\u0027 (git-fixes).\n- nvme-pci: make sure write/poll_queues less or equal then cpu (git-fixes).\n- nvme-pci: remove last_sq_tail (git-fixes).\n- nvme-pci: remove volatile cqes (git-fixes).\n- nvme-pci: slimmer CQ head update (git-fixes).\n- nvme-pci: use simple suspend when a HMB is enabled (git-fixes).\n- nvme-tcp: Fix possible race of io_work and direct send (git-fixes).\n- nvme-tcp: Fix warning with CONFIG_DEBUG_PREEMPT (git-fixes).\n- nvme-tcp: add clean action for failed reconnection (bsc#1183976).\n- nvme-tcp: fix kconfig dependency warning when !CRYPTO (git-fixes).\n- nvme-tcp: fix misuse of __smp_processor_id with preemption (git-fixes).\n- nvme-tcp: fix possible hang waiting for icresp response (bsc#1179519).\n- nvme-tcp: use cancel tagset helper for tear down (bsc#1183976).\n- nvme: Fix NULL dereference for pci nvme controllers (bsc#1182378).\n- nvme: add \u0027kato\u0027 sysfs attribute (bsc#1179825).\n- nvme: add NVME_REQ_CANCELLED flag in nvme_cancel_request() (bsc#1184259).\n- nvme: define constants for identification values (git-fixes).\n- nvme: do not intialize hwmon for discovery controllers (bsc#1184259).\n- nvme: do not intialize hwmon for discovery controllers (git-fixes).\n- nvme: document nvme controller states (git-fixes).\n- nvme: explicitly update mpath disk capacity on revalidation (git-fixes).\n- nvme: expose reconnect_delay and ctrl_loss_tmo via sysfs (bsc#1182378).\n- nvme: fix controller instance leak (git-fixes).\n- nvme: fix deadlock in disconnect during scan_work and/or ana_work (git-fixes).\n- nvme: fix possible deadlock when I/O is blocked (git-fixes).\n- nvme: remove superfluous else in nvme_ctrl_loss_tmo_store (bsc#1182378).\n- nvme: retrigger ANA log update if group descriptor isn\u0027t found (git-fixes)\n- nvme: sanitize KATO setting (bsc#1179825).\n- nvme: simplify error logic in nvme_validate_ns() (bsc#1184259).\n- nvmet: fix a memory leak (git-fixes).\n- nvmet: seset ns-\u003efile when open fails (bsc#1183873).\n- nvmet: use new ana_log_size instead the old one (bsc#1184259).\n- nxp-i2c: restore includes for kABI (bsc#1185589).\n- nxp-nci: add NXP1002 id (bsc#1185589).\n- phy: phy-twl4030-usb: Fix possible use-after-free in twl4030_usb_remove() (git-fixes).\n- pinctrl: ingenic: Improve unreachable code generation (git-fixes).\n- pinctrl: samsung: use \u0027int\u0027 for register masks in Exynos (git-fixes).\n- platform/mellanox: mlxbf-tmfifo: Fix a memory barrier issue (git-fixes).\n- platform/x86: intel_pmc_core: Do not use global pmcdev in quirks (git-fixes).\n- platform/x86: thinkpad_acpi: Correct thermal sensor allocation (git-fixes).\n- posix-timers: Preserve return value in clock_adjtime32() (git-fixes)\n- power: supply: Use IRQF_ONESHOT (git-fixes).\n- power: supply: generic-adc-battery: fix possible use-after-free in gab_remove() (git-fixes).\n- power: supply: s3c_adc_battery: fix possible use-after-free in s3c_adc_bat_remove() (git-fixes).\n- powerpc/64s: Fix crashes when toggling entry flush barrier (bsc#1177666 git-fixes).\n- powerpc/64s: Fix crashes when toggling stf barrier (bsc#1087082 git-fixes).\n- qtnfmac: Fix possible buffer overflow in qtnf_event_handle_external_auth (git-fixes).\n- rtc: pcf2127: handle timestamp interrupts (bsc#1185495).\n- s390/dasd: fix hanging DASD driver unbind (bsc#1183932 LTC#192153).\n- s390/entry: save the caller of psw_idle (bsc#1185677).\n- s390/kdump: fix out-of-memory with PCI (bsc#1182257 LTC#191375).\n- sched/eas: Do not update misfit status if the task is pinned (git-fixes)\n- sched/fair: Avoid stale CPU util_est value for schedutil in (git-fixes)\n- sched/fair: Fix unfairness caused by missing load decay (git-fixes)\n- scripts/git_sort/git_sort.py: Update nvme repositories\n- scripts/git_sort/git_sort.py: add bpf git repo\n- scsi: core: Run queue in case of I/O resource contention failure (bsc#1186416).\n- scsi: fnic: Kill \u0027exclude_id\u0027 argument to fnic_cleanup_io() (bsc#1179851).\n- scsi: libfc: Avoid invoking response handler twice if ep is already completed (bsc#1186573).\n- scsi: lpfc: Add a option to enable interlocked ABTS before job completion (bsc#1186451).\n- scsi: lpfc: Add ndlp kref accounting for resume RPI path (bsc#1186451).\n- scsi: lpfc: Fix \u0027Unexpected timeout\u0027 error in direct attach topology (bsc#1186451).\n- scsi: lpfc: Fix Node recovery when driver is handling simultaneous PLOGIs (bsc#1186451).\n- scsi: lpfc: Fix bad memory access during VPD DUMP mailbox command (bsc#1186451).\n- scsi: lpfc: Fix crash when lpfc_sli4_hba_setup() fails to initialize the SGLs (bsc#1186451).\n- scsi: lpfc: Fix node handling for Fabric Controller and Domain Controller (bsc#1186451).\n- scsi: lpfc: Fix non-optimized ERSP handling (bsc#1186451).\n- scsi: lpfc: Fix unreleased RPIs when NPIV ports are created (bsc#1186451).\n- scsi: lpfc: Ignore GID-FT response that may be received after a link flip (bsc#1186451).\n- scsi: lpfc: Reregister FPIN types if ELS_RDF is received from fabric controller (bsc#1186451).\n- scsi: lpfc: Update lpfc version to 12.8.0.10 (bsc#1186451).\n- sctp: delay auto_asconf init until binding the first addr (\u0026lt;cover.1620748346.git.mkubecek@suse.cz\u003e).\n- serial: core: fix suspicious security_locked_down() call (git-fixes).\n- serial: core: return early on unsupported ioctls (git-fixes).\n- serial: sh-sci: Fix off-by-one error in FIFO threshold register setting (git-fixes).\n- serial: stm32: fix incorrect characters on console (git-fixes).\n- serial: stm32: fix tx_empty condition (git-fixes).\n- serial: tegra: Fix a mask operation that is always true (git-fixes).\n- smc: disallow TCP_ULP in smc_setsockopt() (git-fixes).\n- spi: ath79: always call chipselect function (git-fixes).\n- spi: ath79: remove spi-master setup and cleanup assignment (git-fixes).\n- spi: dln2: Fix reference leak to master (git-fixes).\n- spi: omap-100k: Fix reference leak to master (git-fixes).\n- spi: qup: fix PM reference leak in spi_qup_remove() (git-fixes).\n- spi: spi-fsl-dspi: Fix a resource leak in an error handling path (git-fixes).\n- staging: emxx_udc: fix loop in _nbu2ss_nuke() (git-fixes).\n- staging: iio: cdc: ad7746: avoid overwrite of num_channels (git-fixes).\n- tcp: fix to update snd_wl1 in bulk receiver fast path (\u0026lt;cover.1620748346.git.mkubecek@suse.cz\u003e).\n- thermal/drivers/ti-soc-thermal/bandgap Remove unused variable \u0027val\u0027 (git-fixes).\n- thunderbolt: dma_port: Fix NVM read buffer bounds and offset issue (git-fixes).\n- tracing: Map all PIDs to command lines (git-fixes).\n- tty: amiserial: fix TIOCSSERIAL permission check (git-fixes).\n- tty: fix memory leak in vc_deallocate (git-fixes).\n- tty: moxa: fix TIOCSSERIAL jiffies conversions (git-fixes).\n- tty: moxa: fix TIOCSSERIAL permission check (git-fixes).\n- uio: uio_hv_generic: use devm_kzalloc() for private data alloc (git-fixes).\n- uio_hv_generic: Fix a memory leak in error handling paths (git-fixes).\n- uio_hv_generic: Fix another memory leak in error handling paths (git-fixes).\n- uio_hv_generic: add missed sysfs_remove_bin_file (git-fixes).\n- usb: core: hub: Fix PM reference leak in usb_port_resume() (git-fixes).\n- usb: core: hub: fix race condition about TRSMRCY of resume (git-fixes).\n- usb: dwc2: Fix gadget DMA unmap direction (git-fixes).\n- usb: dwc3: gadget: Enable suspend events (git-fixes).\n- usb: dwc3: gadget: Return success always for kick transfer in ep queue (git-fixes).\n- usb: dwc3: omap: improve extcon initialization (git-fixes).\n- usb: dwc3: pci: Enable usb2-gadget-lpm-disable for Intel Merrifield (git-fixes).\n- usb: fotg210-hcd: Fix an error message (git-fixes).\n- usb: gadget/function/f_fs string table fix for multiple languages (git-fixes).\n- usb: gadget: dummy_hcd: fix gpf in gadget_setup (git-fixes).\n- usb: gadget: f_uac1: validate input parameters (git-fixes).\n- usb: gadget: f_uac2: validate input parameters (git-fixes).\n- usb: gadget: udc: renesas_usb3: Fix a race in usb3_start_pipen() (git-fixes).\n- usb: gadget: uvc: add bInterval checking for HS mode (git-fixes).\n- usb: musb: fix PM reference leak in musb_irq_work() (git-fixes).\n- usb: sl811-hcd: improve misleading indentation (git-fixes).\n- usb: webcam: Invalid size of Processing Unit Descriptor (git-fixes).\n- usb: xhci: Fix port minor revision (git-fixes).\n- usb: xhci: Increase timeout for HC halt (git-fixes).\n- vgacon: Record video mode changes with VT_RESIZEX (git-fixes).\n- video: hyperv_fb: Add ratelimit on error message (bsc#1185725).\n- vrf: fix a comment about loopback device (git-fixes).\n- watchdog/softlockup: Remove obsolete check of last reported task (bsc#1185982).\n- watchdog/softlockup: report the overall time of softlockups (bsc#1185982).\n- watchdog: explicitly update timestamp when reporting softlockup (bsc#1185982).\n- watchdog: rename __touch_watchdog() to a better descriptive name (bsc#1185982).\n- whitespace cleanup\n- wl3501_cs: Fix out-of-bounds warnings in wl3501_mgmt_join (git-fixes).\n- wl3501_cs: Fix out-of-bounds warnings in wl3501_send_pkt (git-fixes).\n- workqueue: Minor follow-ups to the rescuer destruction change (bsc#1185911).\n- workqueue: more destroy_workqueue() fixes (bsc#1185911).\n- x86/cpu: Initialize MSR_TSC_AUX if RDTSCP *or* RDPID is supported (bsc#1152489).\n- xhci: Do not use GFP_KERNEL in (potentially) atomic context (git-fixes).\n- xhci: check control context is valid before dereferencing it (git-fixes).\n- xhci: fix potential array out of bounds with several interrupters (git-fixes).\n- xsk: Respect device\u0027s headroom and tailroom on generic xmit path (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-1888,SUSE-SLE-Module-Public-Cloud-15-SP2-2021-1888",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_1888-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:1888-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20211888-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:1888-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/008950.html"
},
{
"category": "self",
"summary": "SUSE Bug 1087082",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "self",
"summary": "SUSE Bug 1133021",
"url": "https://bugzilla.suse.com/1133021"
},
{
"category": "self",
"summary": "SUSE Bug 1152457",
"url": "https://bugzilla.suse.com/1152457"
},
{
"category": "self",
"summary": "SUSE Bug 1155518",
"url": "https://bugzilla.suse.com/1155518"
},
{
"category": "self",
"summary": "SUSE Bug 1156395",
"url": "https://bugzilla.suse.com/1156395"
},
{
"category": "self",
"summary": "SUSE Bug 1164648",
"url": "https://bugzilla.suse.com/1164648"
},
{
"category": "self",
"summary": "SUSE Bug 1177666",
"url": "https://bugzilla.suse.com/1177666"
},
{
"category": "self",
"summary": "SUSE Bug 1178378",
"url": "https://bugzilla.suse.com/1178378"
},
{
"category": "self",
"summary": "SUSE Bug 1178418",
"url": "https://bugzilla.suse.com/1178418"
},
{
"category": "self",
"summary": "SUSE Bug 1178612",
"url": "https://bugzilla.suse.com/1178612"
},
{
"category": "self",
"summary": "SUSE Bug 1179519",
"url": "https://bugzilla.suse.com/1179519"
},
{
"category": "self",
"summary": "SUSE Bug 1179825",
"url": "https://bugzilla.suse.com/1179825"
},
{
"category": "self",
"summary": "SUSE Bug 1179827",
"url": "https://bugzilla.suse.com/1179827"
},
{
"category": "self",
"summary": "SUSE Bug 1179851",
"url": "https://bugzilla.suse.com/1179851"
},
{
"category": "self",
"summary": "SUSE Bug 1182999",
"url": "https://bugzilla.suse.com/1182999"
},
{
"category": "self",
"summary": "SUSE Bug 1183346",
"url": "https://bugzilla.suse.com/1183346"
},
{
"category": "self",
"summary": "SUSE Bug 1183868",
"url": "https://bugzilla.suse.com/1183868"
},
{
"category": "self",
"summary": "SUSE Bug 1183873",
"url": "https://bugzilla.suse.com/1183873"
},
{
"category": "self",
"summary": "SUSE Bug 1183947",
"url": "https://bugzilla.suse.com/1183947"
},
{
"category": "self",
"summary": "SUSE Bug 1184081",
"url": "https://bugzilla.suse.com/1184081"
},
{
"category": "self",
"summary": "SUSE Bug 1184082",
"url": "https://bugzilla.suse.com/1184082"
},
{
"category": "self",
"summary": "SUSE Bug 1184611",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "self",
"summary": "SUSE Bug 1185428",
"url": "https://bugzilla.suse.com/1185428"
},
{
"category": "self",
"summary": "SUSE Bug 1185495",
"url": "https://bugzilla.suse.com/1185495"
},
{
"category": "self",
"summary": "SUSE Bug 1185497",
"url": "https://bugzilla.suse.com/1185497"
},
{
"category": "self",
"summary": "SUSE Bug 1185589",
"url": "https://bugzilla.suse.com/1185589"
},
{
"category": "self",
"summary": "SUSE Bug 1185606",
"url": "https://bugzilla.suse.com/1185606"
},
{
"category": "self",
"summary": "SUSE Bug 1185645",
"url": "https://bugzilla.suse.com/1185645"
},
{
"category": "self",
"summary": "SUSE Bug 1185680",
"url": "https://bugzilla.suse.com/1185680"
},
{
"category": "self",
"summary": "SUSE Bug 1185703",
"url": "https://bugzilla.suse.com/1185703"
},
{
"category": "self",
"summary": "SUSE Bug 1185725",
"url": "https://bugzilla.suse.com/1185725"
},
{
"category": "self",
"summary": "SUSE Bug 1185758",
"url": "https://bugzilla.suse.com/1185758"
},
{
"category": "self",
"summary": "SUSE Bug 1185859",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "self",
"summary": "SUSE Bug 1185860",
"url": "https://bugzilla.suse.com/1185860"
},
{
"category": "self",
"summary": "SUSE Bug 1185862",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "self",
"summary": "SUSE Bug 1185899",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "self",
"summary": "SUSE Bug 1185911",
"url": "https://bugzilla.suse.com/1185911"
},
{
"category": "self",
"summary": "SUSE Bug 1185938",
"url": "https://bugzilla.suse.com/1185938"
},
{
"category": "self",
"summary": "SUSE Bug 1185988",
"url": "https://bugzilla.suse.com/1185988"
},
{
"category": "self",
"summary": "SUSE Bug 1186061",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "self",
"summary": "SUSE Bug 1186062",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "self",
"summary": "SUSE Bug 1186285",
"url": "https://bugzilla.suse.com/1186285"
},
{
"category": "self",
"summary": "SUSE Bug 1186320",
"url": "https://bugzilla.suse.com/1186320"
},
{
"category": "self",
"summary": "SUSE Bug 1186390",
"url": "https://bugzilla.suse.com/1186390"
},
{
"category": "self",
"summary": "SUSE Bug 1186416",
"url": "https://bugzilla.suse.com/1186416"
},
{
"category": "self",
"summary": "SUSE Bug 1186439",
"url": "https://bugzilla.suse.com/1186439"
},
{
"category": "self",
"summary": "SUSE Bug 1186441",
"url": "https://bugzilla.suse.com/1186441"
},
{
"category": "self",
"summary": "SUSE Bug 1186451",
"url": "https://bugzilla.suse.com/1186451"
},
{
"category": "self",
"summary": "SUSE Bug 1186460",
"url": "https://bugzilla.suse.com/1186460"
},
{
"category": "self",
"summary": "SUSE Bug 1186479",
"url": "https://bugzilla.suse.com/1186479"
},
{
"category": "self",
"summary": "SUSE Bug 1186484",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "self",
"summary": "SUSE Bug 1186501",
"url": "https://bugzilla.suse.com/1186501"
},
{
"category": "self",
"summary": "SUSE Bug 1186573",
"url": "https://bugzilla.suse.com/1186573"
},
{
"category": "self",
"summary": "SUSE Bug 1186681",
"url": "https://bugzilla.suse.com/1186681"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24586 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24587 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24587/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24588 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26139 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26141 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26145 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26145/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26147 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23134 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32399 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33034 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33034/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33200 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3491 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3491/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-06-08T13:07:31Z",
"generator": {
"date": "2021-06-08T13:07:31Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:1888-1",
"initial_release_date": "2021-06-08T13:07:31Z",
"revision_history": [
{
"date": "2021-06-08T13:07:31Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-azure-5.3.18-18.50.2.noarch",
"product": {
"name": "kernel-devel-azure-5.3.18-18.50.2.noarch",
"product_id": "kernel-devel-azure-5.3.18-18.50.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-azure-5.3.18-18.50.2.noarch",
"product": {
"name": "kernel-source-azure-5.3.18-18.50.2.noarch",
"product_id": "kernel-source-azure-5.3.18-18.50.2.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-azure-5.3.18-18.50.2.x86_64",
"product": {
"name": "cluster-md-kmp-azure-5.3.18-18.50.2.x86_64",
"product_id": "cluster-md-kmp-azure-5.3.18-18.50.2.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-5.3.18-18.50.2.x86_64",
"product": {
"name": "dlm-kmp-azure-5.3.18-18.50.2.x86_64",
"product_id": "dlm-kmp-azure-5.3.18-18.50.2.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-5.3.18-18.50.2.x86_64",
"product": {
"name": "gfs2-kmp-azure-5.3.18-18.50.2.x86_64",
"product_id": "gfs2-kmp-azure-5.3.18-18.50.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-5.3.18-18.50.2.x86_64",
"product": {
"name": "kernel-azure-5.3.18-18.50.2.x86_64",
"product_id": "kernel-azure-5.3.18-18.50.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-5.3.18-18.50.2.x86_64",
"product": {
"name": "kernel-azure-devel-5.3.18-18.50.2.x86_64",
"product_id": "kernel-azure-devel-5.3.18-18.50.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-5.3.18-18.50.2.x86_64",
"product": {
"name": "kernel-azure-extra-5.3.18-18.50.2.x86_64",
"product_id": "kernel-azure-extra-5.3.18-18.50.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-livepatch-devel-5.3.18-18.50.2.x86_64",
"product": {
"name": "kernel-azure-livepatch-devel-5.3.18-18.50.2.x86_64",
"product_id": "kernel-azure-livepatch-devel-5.3.18-18.50.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-azure-5.3.18-18.50.1.x86_64",
"product": {
"name": "kernel-syms-azure-5.3.18-18.50.1.x86_64",
"product_id": "kernel-syms-azure-5.3.18-18.50.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-5.3.18-18.50.2.x86_64",
"product": {
"name": "kselftests-kmp-azure-5.3.18-18.50.2.x86_64",
"product_id": "kselftests-kmp-azure-5.3.18-18.50.2.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-5.3.18-18.50.2.x86_64",
"product": {
"name": "ocfs2-kmp-azure-5.3.18-18.50.2.x86_64",
"product_id": "ocfs2-kmp-azure-5.3.18-18.50.2.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-azure-5.3.18-18.50.2.x86_64",
"product": {
"name": "reiserfs-kmp-azure-5.3.18-18.50.2.x86_64",
"product_id": "reiserfs-kmp-azure-5.3.18-18.50.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-5.3.18-18.50.2.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64"
},
"product_reference": "kernel-azure-5.3.18-18.50.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-5.3.18-18.50.2.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64"
},
"product_reference": "kernel-azure-devel-5.3.18-18.50.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-5.3.18-18.50.2.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch"
},
"product_reference": "kernel-devel-azure-5.3.18-18.50.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-5.3.18-18.50.2.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch"
},
"product_reference": "kernel-source-azure-5.3.18-18.50.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-5.3.18-18.50.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
},
"product_reference": "kernel-syms-azure-5.3.18-18.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-24586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24586"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24586",
"url": "https://www.suse.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:31Z",
"details": "moderate"
}
],
"title": "CVE-2020-24586"
},
{
"cve": "CVE-2020-24587",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24587"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24587",
"url": "https://www.suse.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1185862 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:31Z",
"details": "moderate"
}
],
"title": "CVE-2020-24587"
},
{
"cve": "CVE-2020-24588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24588"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24588",
"url": "https://www.suse.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "SUSE Bug 1185861 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1192868"
},
{
"category": "external",
"summary": "SUSE Bug 1199701 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1199701"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:31Z",
"details": "moderate"
}
],
"title": "CVE-2020-24588"
},
{
"cve": "CVE-2020-26139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26139"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26139",
"url": "https://www.suse.com/security/cve/CVE-2020-26139"
},
{
"category": "external",
"summary": "SUSE Bug 1186062 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:31Z",
"details": "moderate"
}
],
"title": "CVE-2020-26139"
},
{
"cve": "CVE-2020-26141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26141"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26141",
"url": "https://www.suse.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "SUSE Bug 1185987 for CVE-2020-26141",
"url": "https://bugzilla.suse.com/1185987"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:31Z",
"details": "moderate"
}
],
"title": "CVE-2020-26141"
},
{
"cve": "CVE-2020-26145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26145"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26145",
"url": "https://www.suse.com/security/cve/CVE-2020-26145"
},
{
"category": "external",
"summary": "SUSE Bug 1185860 for CVE-2020-26145",
"url": "https://bugzilla.suse.com/1185860"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:31Z",
"details": "moderate"
}
],
"title": "CVE-2020-26145"
},
{
"cve": "CVE-2020-26147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26147"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26147",
"url": "https://www.suse.com/security/cve/CVE-2020-26147"
},
{
"category": "external",
"summary": "SUSE Bug 1233723 for CVE-2020-26147",
"url": "https://bugzilla.suse.com/1233723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:31Z",
"details": "moderate"
}
],
"title": "CVE-2020-26147"
},
{
"cve": "CVE-2021-23134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23134"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23134",
"url": "https://www.suse.com/security/cve/CVE-2021-23134"
},
{
"category": "external",
"summary": "SUSE Bug 1186060 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "external",
"summary": "SUSE Bug 1186061 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "external",
"summary": "SUSE Bug 1220739 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1220739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:31Z",
"details": "important"
}
],
"title": "CVE-2021-23134"
},
{
"cve": "CVE-2021-32399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32399"
}
],
"notes": [
{
"category": "general",
"text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32399",
"url": "https://www.suse.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "SUSE Bug 1184611 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "external",
"summary": "SUSE Bug 1185898 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "external",
"summary": "SUSE Bug 1185899 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:31Z",
"details": "important"
}
],
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-33034",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33034"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33034",
"url": "https://www.suse.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "SUSE Bug 1186111 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "external",
"summary": "SUSE Bug 1186285 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:31Z",
"details": "important"
}
],
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-33200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33200"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-\u003ealu_limit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33200",
"url": "https://www.suse.com/security/cve/CVE-2021-33200"
},
{
"category": "external",
"summary": "SUSE Bug 1186484 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "external",
"summary": "SUSE Bug 1186498 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:31Z",
"details": "important"
}
],
"title": "CVE-2021-33200"
},
{
"cve": "CVE-2021-3491",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3491"
}
],
"notes": [
{
"category": "general",
"text": "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3491",
"url": "https://www.suse.com/security/cve/CVE-2021-3491"
},
{
"category": "external",
"summary": "SUSE Bug 1185642 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "external",
"summary": "SUSE Bug 1187090 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1187090"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:31Z",
"details": "important"
}
],
"title": "CVE-2021-3491"
}
]
}
suse-su-2021:2421-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 15 LTSS kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-22555: A heap out-of-bounds write was discovered in net/netfilter/x_tables.c (bnc#1188116 ).\n- CVE-2021-33909: Extremely large seq buffer allocations in seq_file could lead to buffer underruns and code execution (bsc#1188062).\n- CVE-2021-3609: A use-after-free in can/bcm could have led to privilege escalation (bsc#1187215).\n- CVE-2021-33624: In kernel/bpf/verifier.c a branch can be mispredicted (e.g., because of type confusion) and consequently an unprivileged BPF program can read arbitrary memory locations via a side-channel attack, aka CID-9183671af6db (bnc#1187554).\n- CVE-2021-0605: In pfkey_dump of af_key.c, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation (bnc#1187601).\n- CVE-2021-0512: In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation (bnc#1187595).\n- CVE-2020-26558: Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time (bnc#1179610).\n- CVE-2021-34693: net/can/bcm.c in the Linux kernel allowed local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized (bnc#1187452).\n- CVE-2020-36385: An issue was discovered in the Linux kernel drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c (bnc#1187050).\n- CVE-2021-0129: Improper access control in BlueZ may have allowed an authenticated user to potentially enable information disclosure via adjacent access (bnc#1186463).\n- CVE-2020-36386: An issue was discovered in the Linux kernel net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf (bnc#1187038).\n- CVE-2020-24588: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets (bnc#1185861).\n- CVE-2021-33200: kernel/bpf/verifier.c enforced incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-\u003ealu_limit (bnc#1186484).\n- CVE-2021-33034: net/bluetooth/hci_event.c had a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value (bnc#1186111).\n- CVE-2020-26139: An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and made it easier to exploit other vulnerabilities in connected clients (bnc#1186062).\n- CVE-2021-23134: Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability (bnc#1186060).\n- CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data (bnc#1185859).\n- CVE-2020-26141: The Wi-Fi implementation did not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol (bnc#1185987).\n- CVE-2020-26145: The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration (bnc#1185860).\n- CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed (bnc#1185859 bnc#1185862).\n- CVE-2020-26147: The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used. ()\n- CVE-2021-3491: The io_uring subsystem allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. (bnc#1185642).\n- CVE-2021-23133: A race condition in SCTP sockets (net/sctp/socket.c) could lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket (bnc#1184675).\n- CVE-2021-32399: net/bluetooth/hci_request.c in the Linux kernel has a race condition for removal of the HCI controller (bnc#1184611 bnc#1185898).\n\nThe following non-security bugs were fixed:\n\n- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185725).\n- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185725).\n- af_packet: fix the tx skb protocol in raw sockets with ETH_P_ALL (bsc#1176081).\n- dm: fix redundant IO accounting for bios that need splitting (bsc#1183738).\n- kabi: preserve struct header_ops after bsc#1176081 fix (bsc#1176081).\n- net/ethernet: Add parse_protocol header_ops support (bsc#1176081).\n- net/mlx5e: Remove the wrong assumption about transport offset (bsc#1176081).\n- net/mlx5e: Trust kernel regarding transport offset (bsc#1176081).\n- net/packet: Ask driver for protocol if not provided by user (bsc#1176081).\n- net/packet: Remove redundant skb-\u003eprotocol set (bsc#1176081).\n- net: Do not set transport offset to invalid value (bsc#1176081).\n- net: Introduce parse_protocol header_ops callback (bsc#1176081).\n- video: hyperv_fb: Add ratelimit on error message (bsc#1185725).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2421,SUSE-SLE-Module-Live-Patching-15-2021-2421,SUSE-SLE-Product-HA-15-2021-2421,SUSE-SLE-Product-HPC-15-2021-2421,SUSE-SLE-Product-SLES-15-2021-2421,SUSE-SLE-Product-SLES_SAP-15-2021-2421",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2421-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2421-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212421-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2421-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html"
},
{
"category": "self",
"summary": "SUSE Bug 1176081",
"url": "https://bugzilla.suse.com/1176081"
},
{
"category": "self",
"summary": "SUSE Bug 1179610",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "self",
"summary": "SUSE Bug 1183738",
"url": "https://bugzilla.suse.com/1183738"
},
{
"category": "self",
"summary": "SUSE Bug 1184611",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "self",
"summary": "SUSE Bug 1184675",
"url": "https://bugzilla.suse.com/1184675"
},
{
"category": "self",
"summary": "SUSE Bug 1185642",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "self",
"summary": "SUSE Bug 1185725",
"url": "https://bugzilla.suse.com/1185725"
},
{
"category": "self",
"summary": "SUSE Bug 1185859",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "self",
"summary": "SUSE Bug 1185860",
"url": "https://bugzilla.suse.com/1185860"
},
{
"category": "self",
"summary": "SUSE Bug 1185861",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "self",
"summary": "SUSE Bug 1185862",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "self",
"summary": "SUSE Bug 1185898",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "self",
"summary": "SUSE Bug 1185987",
"url": "https://bugzilla.suse.com/1185987"
},
{
"category": "self",
"summary": "SUSE Bug 1186060",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "self",
"summary": "SUSE Bug 1186062",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "self",
"summary": "SUSE Bug 1186111",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "self",
"summary": "SUSE Bug 1186463",
"url": "https://bugzilla.suse.com/1186463"
},
{
"category": "self",
"summary": "SUSE Bug 1186484",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "self",
"summary": "SUSE Bug 1187038",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "self",
"summary": "SUSE Bug 1187050",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "self",
"summary": "SUSE Bug 1187215",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "self",
"summary": "SUSE Bug 1187452",
"url": "https://bugzilla.suse.com/1187452"
},
{
"category": "self",
"summary": "SUSE Bug 1187554",
"url": "https://bugzilla.suse.com/1187554"
},
{
"category": "self",
"summary": "SUSE Bug 1187595",
"url": "https://bugzilla.suse.com/1187595"
},
{
"category": "self",
"summary": "SUSE Bug 1187601",
"url": "https://bugzilla.suse.com/1187601"
},
{
"category": "self",
"summary": "SUSE Bug 1188062",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "self",
"summary": "SUSE Bug 1188116",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24586 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24587 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24587/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24588 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26139 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26141 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26145 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26145/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26147 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26558 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36385 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36386 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36386/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0129 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0512 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0512/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0605 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0605/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22555 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23133 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23134 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32399 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33034 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33034/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33200 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33624 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33624/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-34693 page",
"url": "https://www.suse.com/security/cve/CVE-2021-34693/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3491 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3491/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3609 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3609/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-07-21T09:01:19Z",
"generator": {
"date": "2021-07-21T09:01:19Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2421-1",
"initial_release_date": "2021-07-21T09:01:19Z",
"revision_history": [
{
"date": "2021-07-21T09:01:19Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"product_id": "cluster-md-kmp-default-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150.75.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.12.14-150.75.1.aarch64",
"product_id": "dlm-kmp-default-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"product_id": "gfs2-kmp-default-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-default-4.12.14-150.75.1.aarch64",
"product_id": "kernel-default-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-default-base-4.12.14-150.75.1.aarch64",
"product_id": "kernel-default-base-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-default-devel-4.12.14-150.75.1.aarch64",
"product_id": "kernel-default-devel-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-default-extra-4.12.14-150.75.1.aarch64",
"product_id": "kernel-default-extra-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-default-livepatch-4.12.14-150.75.1.aarch64",
"product_id": "kernel-default-livepatch-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-150.75.1.aarch64",
"product_id": "kernel-default-livepatch-devel-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-obs-build-4.12.14-150.75.1.aarch64",
"product_id": "kernel-obs-build-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.12.14-150.75.1.aarch64",
"product_id": "kernel-obs-qa-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-syms-4.12.14-150.75.1.aarch64",
"product_id": "kernel-syms-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-vanilla-4.12.14-150.75.1.aarch64",
"product_id": "kernel-vanilla-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"product_id": "kernel-vanilla-base-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150.75.1.aarch64",
"product_id": "kernel-vanilla-devel-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.aarch64",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150.75.1.aarch64",
"product": {
"name": "kselftests-kmp-default-4.12.14-150.75.1.aarch64",
"product_id": "kselftests-kmp-default-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"product_id": "ocfs2-kmp-default-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"product_id": "reiserfs-kmp-default-4.12.14-150.75.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.12.14-150.75.1.noarch",
"product": {
"name": "kernel-devel-4.12.14-150.75.1.noarch",
"product_id": "kernel-devel-4.12.14-150.75.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.12.14-150.75.1.noarch",
"product": {
"name": "kernel-docs-4.12.14-150.75.1.noarch",
"product_id": "kernel-docs-4.12.14-150.75.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.12.14-150.75.1.noarch",
"product": {
"name": "kernel-docs-html-4.12.14-150.75.1.noarch",
"product_id": "kernel-docs-html-4.12.14-150.75.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.12.14-150.75.1.noarch",
"product": {
"name": "kernel-macros-4.12.14-150.75.1.noarch",
"product_id": "kernel-macros-4.12.14-150.75.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.12.14-150.75.1.noarch",
"product": {
"name": "kernel-source-4.12.14-150.75.1.noarch",
"product_id": "kernel-source-4.12.14-150.75.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.12.14-150.75.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.12.14-150.75.1.noarch",
"product_id": "kernel-source-vanilla-4.12.14-150.75.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"product_id": "dlm-kmp-default-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"product_id": "gfs2-kmp-default-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-debug-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-debug-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-debug-base-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-debug-devel-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-debug-livepatch-devel-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-debug-livepatch-devel-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-default-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-default-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-default-base-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-default-base-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-default-devel-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-default-extra-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-default-livepatch-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-default-livepatch-devel-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-obs-build-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-obs-qa-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-syms-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-syms-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-vanilla-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-vanilla-base-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.12.14-150.75.1.ppc64le",
"product_id": "kselftests-kmp-default-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"product_id": "reiserfs-kmp-default-4.12.14-150.75.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"product_id": "cluster-md-kmp-default-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150.75.1.s390x",
"product": {
"name": "dlm-kmp-default-4.12.14-150.75.1.s390x",
"product_id": "dlm-kmp-default-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150.75.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.12.14-150.75.1.s390x",
"product_id": "gfs2-kmp-default-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-default-4.12.14-150.75.1.s390x",
"product_id": "kernel-default-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-default-base-4.12.14-150.75.1.s390x",
"product_id": "kernel-default-base-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-default-devel-4.12.14-150.75.1.s390x",
"product_id": "kernel-default-devel-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-default-extra-4.12.14-150.75.1.s390x",
"product_id": "kernel-default-extra-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-default-livepatch-4.12.14-150.75.1.s390x",
"product_id": "kernel-default-livepatch-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-150.75.1.s390x",
"product_id": "kernel-default-livepatch-devel-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-default-man-4.12.14-150.75.1.s390x",
"product_id": "kernel-default-man-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-obs-build-4.12.14-150.75.1.s390x",
"product_id": "kernel-obs-build-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-obs-qa-4.12.14-150.75.1.s390x",
"product_id": "kernel-obs-qa-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-syms-4.12.14-150.75.1.s390x",
"product_id": "kernel-syms-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-vanilla-4.12.14-150.75.1.s390x",
"product_id": "kernel-vanilla-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.s390x",
"product_id": "kernel-vanilla-base-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150.75.1.s390x",
"product_id": "kernel-vanilla-devel-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.s390x",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.12.14-150.75.1.s390x",
"product_id": "kernel-zfcpdump-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-man-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-zfcpdump-man-4.12.14-150.75.1.s390x",
"product_id": "kernel-zfcpdump-man-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150.75.1.s390x",
"product": {
"name": "kselftests-kmp-default-4.12.14-150.75.1.s390x",
"product_id": "kselftests-kmp-default-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"product_id": "ocfs2-kmp-default-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"product_id": "reiserfs-kmp-default-4.12.14-150.75.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"product_id": "cluster-md-kmp-default-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150.75.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.12.14-150.75.1.x86_64",
"product_id": "dlm-kmp-default-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"product_id": "gfs2-kmp-default-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-debug-4.12.14-150.75.1.x86_64",
"product_id": "kernel-debug-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-debug-base-4.12.14-150.75.1.x86_64",
"product_id": "kernel-debug-base-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.12.14-150.75.1.x86_64",
"product_id": "kernel-debug-devel-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-debug-livepatch-devel-4.12.14-150.75.1.x86_64",
"product_id": "kernel-debug-livepatch-devel-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-default-4.12.14-150.75.1.x86_64",
"product_id": "kernel-default-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-default-base-4.12.14-150.75.1.x86_64",
"product_id": "kernel-default-base-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-default-devel-4.12.14-150.75.1.x86_64",
"product_id": "kernel-default-devel-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-default-extra-4.12.14-150.75.1.x86_64",
"product_id": "kernel-default-extra-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"product_id": "kernel-default-livepatch-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-150.75.1.x86_64",
"product_id": "kernel-default-livepatch-devel-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-kvmsmall-4.12.14-150.75.1.x86_64",
"product_id": "kernel-kvmsmall-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-150.75.1.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-4.12.14-150.75.1.x86_64",
"product_id": "kernel-kvmsmall-devel-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-4.12.14-150.75.1.x86_64",
"product_id": "kernel-kvmsmall-livepatch-devel-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-obs-build-4.12.14-150.75.1.x86_64",
"product_id": "kernel-obs-build-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.12.14-150.75.1.x86_64",
"product_id": "kernel-obs-qa-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-syms-4.12.14-150.75.1.x86_64",
"product_id": "kernel-syms-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-150.75.1.x86_64",
"product_id": "kernel-vanilla-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150.75.1.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.x86_64",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150.75.1.x86_64",
"product": {
"name": "kselftests-kmp-default-4.12.14-150.75.1.x86_64",
"product_id": "kselftests-kmp-default-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"product_id": "ocfs2-kmp-default-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"product_id": "reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64"
},
"product_reference": "dlm-kmp-default-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x"
},
"product_reference": "dlm-kmp-default-4.12.14-150.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64"
},
"product_reference": "gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.12.14-150.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-source-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-source-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x"
},
"product_reference": "kernel-default-4.12.14-150.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-150.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-150.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-150.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x"
},
"product_reference": "kernel-obs-build-4.12.14-150.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-source-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-150.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-source-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-24586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24586"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24586",
"url": "https://www.suse.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2020-24586"
},
{
"cve": "CVE-2020-24587",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24587"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24587",
"url": "https://www.suse.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1185862 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2020-24587"
},
{
"cve": "CVE-2020-24588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24588"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24588",
"url": "https://www.suse.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "SUSE Bug 1185861 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1192868"
},
{
"category": "external",
"summary": "SUSE Bug 1199701 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1199701"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2020-24588"
},
{
"cve": "CVE-2020-26139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26139"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26139",
"url": "https://www.suse.com/security/cve/CVE-2020-26139"
},
{
"category": "external",
"summary": "SUSE Bug 1186062 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2020-26139"
},
{
"cve": "CVE-2020-26141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26141"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26141",
"url": "https://www.suse.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "SUSE Bug 1185987 for CVE-2020-26141",
"url": "https://bugzilla.suse.com/1185987"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2020-26141"
},
{
"cve": "CVE-2020-26145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26145"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26145",
"url": "https://www.suse.com/security/cve/CVE-2020-26145"
},
{
"category": "external",
"summary": "SUSE Bug 1185860 for CVE-2020-26145",
"url": "https://bugzilla.suse.com/1185860"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2020-26145"
},
{
"cve": "CVE-2020-26147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26147"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26147",
"url": "https://www.suse.com/security/cve/CVE-2020-26147"
},
{
"category": "external",
"summary": "SUSE Bug 1233723 for CVE-2020-26147",
"url": "https://bugzilla.suse.com/1233723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2020-26147"
},
{
"cve": "CVE-2020-26558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26558"
}
],
"notes": [
{
"category": "general",
"text": "Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26558",
"url": "https://www.suse.com/security/cve/CVE-2020-26558"
},
{
"category": "external",
"summary": "SUSE Bug 1179610 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2020-26558"
},
{
"cve": "CVE-2020-36385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36385"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36385",
"url": "https://www.suse.com/security/cve/CVE-2020-36385"
},
{
"category": "external",
"summary": "SUSE Bug 1187050 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "external",
"summary": "SUSE Bug 1187052 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196914"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "important"
}
],
"title": "CVE-2020-36385"
},
{
"cve": "CVE-2020-36386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36386"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.8.1. net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36386",
"url": "https://www.suse.com/security/cve/CVE-2020-36386"
},
{
"category": "external",
"summary": "SUSE Bug 1187038 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2020-36386"
},
{
"cve": "CVE-2021-0129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0129"
}
],
"notes": [
{
"category": "general",
"text": "Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0129",
"url": "https://www.suse.com/security/cve/CVE-2021-0129"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2021-0129",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2021-0129"
},
{
"cve": "CVE-2021-0512",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0512"
}
],
"notes": [
{
"category": "general",
"text": "In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-173843328References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0512",
"url": "https://www.suse.com/security/cve/CVE-2021-0512"
},
{
"category": "external",
"summary": "SUSE Bug 1187595 for CVE-2021-0512",
"url": "https://bugzilla.suse.com/1187595"
},
{
"category": "external",
"summary": "SUSE Bug 1187597 for CVE-2021-0512",
"url": "https://bugzilla.suse.com/1187597"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "important"
}
],
"title": "CVE-2021-0512"
},
{
"cve": "CVE-2021-0605",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0605"
}
],
"notes": [
{
"category": "general",
"text": "In pfkey_dump of af_key.c, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-110373476",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0605",
"url": "https://www.suse.com/security/cve/CVE-2021-0605"
},
{
"category": "external",
"summary": "SUSE Bug 1187601 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1187601"
},
{
"category": "external",
"summary": "SUSE Bug 1187687 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1187687"
},
{
"category": "external",
"summary": "SUSE Bug 1188381 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1188381"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "important"
}
],
"title": "CVE-2021-0605"
},
{
"cve": "CVE-2021-22555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22555"
}
],
"notes": [
{
"category": "general",
"text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22555",
"url": "https://www.suse.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "SUSE Bug 1188116 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "external",
"summary": "SUSE Bug 1188117 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "external",
"summary": "SUSE Bug 1188411 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "important"
}
],
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-23133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23133"
}
],
"notes": [
{
"category": "general",
"text": "A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23133",
"url": "https://www.suse.com/security/cve/CVE-2021-23133"
},
{
"category": "external",
"summary": "SUSE Bug 1184675 for CVE-2021-23133",
"url": "https://bugzilla.suse.com/1184675"
},
{
"category": "external",
"summary": "SUSE Bug 1185901 for CVE-2021-23133",
"url": "https://bugzilla.suse.com/1185901"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2021-23133"
},
{
"cve": "CVE-2021-23134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23134"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23134",
"url": "https://www.suse.com/security/cve/CVE-2021-23134"
},
{
"category": "external",
"summary": "SUSE Bug 1186060 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "external",
"summary": "SUSE Bug 1186061 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "external",
"summary": "SUSE Bug 1220739 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1220739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "important"
}
],
"title": "CVE-2021-23134"
},
{
"cve": "CVE-2021-32399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32399"
}
],
"notes": [
{
"category": "general",
"text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32399",
"url": "https://www.suse.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "SUSE Bug 1184611 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "external",
"summary": "SUSE Bug 1185898 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "external",
"summary": "SUSE Bug 1185899 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "important"
}
],
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-33034",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33034"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33034",
"url": "https://www.suse.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "SUSE Bug 1186111 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "external",
"summary": "SUSE Bug 1186285 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "important"
}
],
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-33200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33200"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-\u003ealu_limit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33200",
"url": "https://www.suse.com/security/cve/CVE-2021-33200"
},
{
"category": "external",
"summary": "SUSE Bug 1186484 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "external",
"summary": "SUSE Bug 1186498 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "important"
}
],
"title": "CVE-2021-33200"
},
{
"cve": "CVE-2021-33624",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33624"
}
],
"notes": [
{
"category": "general",
"text": "In kernel/bpf/verifier.c in the Linux kernel before 5.12.13, a branch can be mispredicted (e.g., because of type confusion) and consequently an unprivileged BPF program can read arbitrary memory locations via a side-channel attack, aka CID-9183671af6db.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33624",
"url": "https://www.suse.com/security/cve/CVE-2021-33624"
},
{
"category": "external",
"summary": "SUSE Bug 1187554 for CVE-2021-33624",
"url": "https://bugzilla.suse.com/1187554"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2021-33624"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-34693",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-34693"
}
],
"notes": [
{
"category": "general",
"text": "net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-34693",
"url": "https://www.suse.com/security/cve/CVE-2021-34693"
},
{
"category": "external",
"summary": "SUSE Bug 1187452 for CVE-2021-34693",
"url": "https://bugzilla.suse.com/1187452"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2021-34693",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2021-34693"
},
{
"cve": "CVE-2021-3491",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3491"
}
],
"notes": [
{
"category": "general",
"text": "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3491",
"url": "https://www.suse.com/security/cve/CVE-2021-3491"
},
{
"category": "external",
"summary": "SUSE Bug 1185642 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "external",
"summary": "SUSE Bug 1187090 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1187090"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "important"
}
],
"title": "CVE-2021-3491"
},
{
"cve": "CVE-2021-3609",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3609"
}
],
"notes": [
{
"category": "general",
"text": ".A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3609",
"url": "https://www.suse.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "SUSE Bug 1187215 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "external",
"summary": "SUSE Bug 1188323 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188323"
},
{
"category": "external",
"summary": "SUSE Bug 1188720 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188720"
},
{
"category": "external",
"summary": "SUSE Bug 1190276 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1190276"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1196810"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2021-3609"
}
]
}
suse-su-2021:1977-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-33200: Enforcing incorrect limits for pointer arithmetic operations by the BPF verifier could be abused to perform out-of-bounds reads and writes in kernel memory (bsc#1186484).\n- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values. (bsc#1186111)\n- CVE-2020-26139: Fixed a denial-of-service when an Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. (bnc#1186062)\n- CVE-2021-23134: A Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges. (bnc#1186060)\n- CVE-2021-3491: Fixed a potential heap overflow in mem_rw(). This vulnerability is related to the PROVIDE_BUFFERS operation, which allowed the MAX_RW_COUNT limit to be bypassed (bsc#1185642).\n- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).\n- CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances this can be abused to inject arbitrary network packets and/or exfiltrate user data (bnc#1185859).\n- CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed (bnc#1185859 bnc#1185862).\n- CVE-2020-24588: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets. (bnc#1185861)\n- CVE-2020-26147: The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments, even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used (bnc#1185859).\n- CVE-2020-26145: An issue was discovered with Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration. (bnc#1185860)\n- CVE-2020-26141: An issue was discovered in the ALFA driver for AWUS036H, where the Message Integrity Check (authenticity) of fragmented TKIP frames was not verified. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bnc#1185987)\n- CVE-2021-29650: Fixed an issue with the netfilter subsystem that allowed attackers to cause a denial of service (panic) because net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h lack a full memory barrier upon the assignment of a new table value (bnc#1184208).\n- CVE-2021-29155: Fixed an issue that was discovered in kernel/bpf/verifier.c that performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory. Specifically, for sequences of pointer arithmetic operations, the pointer modification performed by the first operation was not correctly accounted for when restricting subsequent operations (bnc#1184942).\n- CVE-2021-3444: Fixed an issue with the bpf verifier which did not properly handle mod32 destination register truncation when the source register was known to be 0 leading to out of bounds read (bsc#1184170).\n- CVE-2021-3428: Fixed an integer overflow in ext4_es_cache_extent (bsc#1173485).\n- CVE-2021-29647: Fixed an issue in qrtr_recvmsg which could have allowed attackers to obtain sensitive information from kernel memory because of a partially uninitialized data structure (bsc#1184192 ).\n- CVE-2021-29265: Fixed an issue in usbip_sockfd_store which could have allowed attackers to cause a denial of service due to race conditions during an update of the local and shared status (bsc#1184167).\n- CVE-2021-29264: Fixed an issue in the Freescale Gianfar Ethernet driver which could have allowed attackers to cause a system crash due to a calculation of negative fragment size (bsc#1184168).\n- CVE-2021-28972: Fixed a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly (bsc#1184198).\n- CVE-2021-28971: Fixed an issue in intel_pmu_drain_pebs_nhm which could have caused a system crash because the PEBS status in a PEBS record was mishandled (bsc#1184196 ).\n- CVE-2021-28964: Fixed a race condition in get_old_root which could have allowed attackers to cause a denial of service (bsc#1184193).\n- CVE-2021-28688: Fixed an issue introduced by XSA-365 (bsc#1183646).\n- CVE-2021-28660: Fixed an out of bounds write in rtw_wx_set_scan (bsc#1183593 ).\n- CVE-2021-28375: Fixed an issue in fastrpc_internal_invoke which did not prevent user applications from sending kernel RPC messages (bsc#1183596).\n- CVE-2021-28038: Fixed an issue with the netback driver which was lacking necessary treatment of errors such as failed memory allocations (bsc#1183022).\n- CVE-2021-27365: Fixed an issue where an unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message (bsc#1182715).\n- CVE-2021-27364: Fixed an issue where an attacker could craft Netlink messages (bsc#1182717).\n- CVE-2021-27363: Fixed a kernel pointer leak which could have been used to determine the address of the iscsi_transport structure (bsc#1182716).\n- CVE-2020-35519: Fixed an out-of-bounds memory access was found in x25_bind (bsc#1183696).\n- CVE-2020-27815: Fixed an issue in JFS filesystem where could have allowed an attacker to execute code (bsc#1179454).\n- CVE-2020-27171: Fixed an off-by-one error affecting out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory (bsc#1183775).\n- CVE-2020-27170: Fixed potential side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory (bsc#1183686).\n- CVE-2019-19769: Fixed a use-after-free in the perf_trace_lock_acquire function (bsc#1159280 ).\n- CVE-2019-18814: Fixed a use-after-free when aa_label_parse() fails in aa_audit_rule_init() (bsc#1156256).\n- CVE-2021-3483: Fixed a use-after-free in nosy.c (bsc#1184393).\n- CVE-2021-30002: Fixed a memory leak for large arguments in video_usercopy (bsc#1184120).\n- CVE-2021-29154: Fixed incorrect computation of branch displacements, allowing arbitrary code execution (bsc#1184391).\n- CVE-2021-28950: Fixed an issue in fs/fuse/fuse_i.h due to a retry loop continually was finding the same bad inode (bsc#1184194).\n- CVE-2021-28952: Fixed a buffer overflow in the soundwire device driver, triggered when an unexpected port ID number is encountered. (bnc#1184197).\n- CVE-2021-20268: Fixed an out-of-bounds access flaw in the implementation of the eBPF code verifier. This flaw allowed a local user to crash the system or possibly escalate their privileges. (bnc#1183077)\n- CVE-2020-27673: Fixed a vulnerability with xen, where guest OS users could cause a denial of service (host OS hang) via a high rate of events to dom0 (bnc#1177411).\n- CVE-2020-36312: Fixed a memory leak upon a kmalloc failure (bsc#1184509 ).\n- CVE-2020-36311: Fixed a denial of service (soft lockup) by triggering destruction of a large SEV VM (bsc#1184511).\n- CVE-2020-36310: Fixed infinite loop for certain nested page faults (bsc#1184512).\n- CVE-2021-3489: Fixed an issue where the eBPF RINGBUF bpf_ringbuf_reserve did not check that the allocated size was smaller than the ringbuf size (bnc#1185640).\n- CVE-2021-3490: Fixed an issue where the eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) did not update the 32-bit bounds (bnc#1185641 bnc#1185796 ).\n- CVE-2020-36322: Fixed an issue was discovered in FUSE filesystem implementation which could have caused a system crash (bsc#1184211).\n- CVE-2020-25670, CVE-2020-25671, CVE-2020-25672, CVE-2020-25673: Fixed multiple bugs in NFC subsytem (bsc#1178181).\n\nThe following non-security bugs were fixed:\n\n- ACPI / hotplug / PCI: Fix reference count leak in enable_slot() (git-fixes).\n- ACPI / idle: override c-state latency when not in conformance with s0ix (bsc#1185840).\n- ACPI: CPPC: Replace cppc_attr with kobj_attribute (git-fixes).\n- ACPI: GTDT: Do not corrupt interrupt mappings on watchdow probe failure (git-fixes).\n- ACPI: PM: Add ACPI ID of Alder Lake Fan (git-fixes).\n- ACPI: PM: s2idle: Add AMD support to handle _DSM (bsc#1185840).\n- ACPI: PM: s2idle: Add missing LPS0 functions for AMD (bsc#1185840).\n- ACPI: PM: s2idle: Drop unused local variables and related code (bsc#1185840).\n- ACPI: PM: s2idle: Move x86-specific code to the x86 directory (bsc#1185840).\n- ACPI: custom_method: fix a possible memory leak (git-fixes).\n- ACPI: custom_method: fix potential use-after-free issue (git-fixes).\n- ACPI: processor: Fix CPU0 wakeup in acpi_idle_play_dead() (git-fixes).\n- ACPI: processor: Fix build when CONFIG_ACPI_PROCESSOR=m (git-fixes).\n- ACPI: scan: Rearrange memory allocation in acpi_device_add() (git-fixes).\n- ACPI: video: Add DMI quirk for GIGABYTE GB-BXBT-2807 (git-fixes).\n- ACPI: video: Add missing callback back for Sony VPCEH3U1E (git-fixes).\n- ACPICA: Always create namespace nodes using acpi_ns_create_node() (git-fixes).\n- ACPICA: Enable sleep button on ACPI legacy wake (bsc#1181383).\n- ACPICA: Fix race in generic_serial_bus (I2C) and GPIO op_region parameter handling (git-fixes).\n- ALSA: Convert strlcpy to strscpy when return value is unused (git-fixes).\n- ALSA: aloop: Fix initialization of controls (git-fixes).\n- ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro (git-fixes).\n- ALSA: bebob: enable to deliver MIDI messages for multiple ports (git-fixes).\n- ALSA: core: remove redundant spin_lock pair in snd_card_disconnect (git-fixes).\n- ALSA: dice: fix null pointer dereference when node is disconnected (git-fixes).\n- ALSA: dice: fix stream format at middle sampling rate for Alesis iO 26 (git-fixes).\n- ALSA: dice: fix stream format for TC Electronic Konnekt Live at high sampling transfer frequency (git-fixes).\n- ALSA: emu8000: Fix a use after free in snd_emu8000_create_mixer (git-fixes).\n- ALSA: firewire-lib: fix amdtp_packet tracepoints event for packet_index field (git-fixes).\n- ALSA: firewire-lib: fix calculation for size of IR context payload (git-fixes).\n- ALSA: firewire-lib: fix check for the size of isochronous packet payload (git-fixes).\n- ALSA: hda/ca0132: Add Sound BlasterX AE-5 Plus support (git-fixes).\n- ALSA: hda/cirrus: Add Headphone and Headset MIC Volume Control (git-fixes).\n- ALSA: hda/cirrus: Add error handling into CS8409 I2C functions (git-fixes).\n- ALSA: hda/cirrus: Add jack detect interrupt support from CS42L42 companion codec (git-fixes).\n- ALSA: hda/cirrus: Add support for CS8409 HDA bridge and CS42L42 companion codec (git-fixes).\n- ALSA: hda/cirrus: Cleanup patch_cirrus.c code (git-fixes).\n- ALSA: hda/cirrus: Fix CS42L42 Headset Mic volume control name (git-fixes).\n- ALSA: hda/cirrus: Make CS8409 driver more generic by using fixups (git-fixes).\n- ALSA: hda/cirrus: Set Initial DMIC volume for Bullseye to -26 dB (git-fixes).\n- ALSA: hda/cirrus: Use CS8409 filter to fix abnormal sounds on Bullseye (git-fixes).\n- ALSA: hda/conexant: Add quirk for mute LED control on HP ZBook G5 (git-fixes).\n- ALSA: hda/conexant: Apply quirk for another HP ZBook G5 model (git-fixes).\n- ALSA: hda/conexant: Re-order CX5066 quirk table entries (git-fixes).\n- ALSA: hda/conexant: Re-order CX5066 quirk table entries (git-fixes).\n- ALSA: hda/hdmi: Cancel pending works before suspend (bsc#1182377).\n- ALSA: hda/hdmi: Cancel pending works before suspend (git-fixes).\n- ALSA: hda/hdmi: fix race in handling acomp ELD notification at resume (git-fixes).\n- ALSA: hda/realtek - Headset Mic issue on HP platform (git-fixes).\n- ALSA: hda/realtek: ALC285 Thinkpad jack pin quirk is unreachable (git-fixes).\n- ALSA: hda/realtek: Add fixup for HP OMEN laptop (git-fixes).\n- ALSA: hda/realtek: Add fixup for HP Spectre x360 15-df0xxx (git-fixes).\n- ALSA: hda/realtek: Add quirk for Intel Clevo PCx0Dx (git-fixes).\n- ALSA: hda/realtek: Add quirk for Lenovo Ideapad S740 (git-fixes).\n- ALSA: hda/realtek: Add some CLOVE SSIDs of ALC293 (git-fixes).\n- ALSA: hda/realtek: Apply headset-mic quirks for Xiaomi Redmibook Air (git-fixes).\n- ALSA: hda/realtek: Chain in pop reduction fixup for ThinkStation P340 (git-fixes).\n- ALSA: hda/realtek: Enable mute/micmute LEDs and limit mic boost on EliteBook 845 G8 (git-fixes).\n- ALSA: hda/realtek: Fix silent headphone output on ASUS UX430UA (git-fixes).\n- ALSA: hda/realtek: Fix speaker amp on HP Envy AiO 32 (git-fixes).\n- ALSA: hda/realtek: Fix speaker amp setup on Acer Aspire E1 (git-fixes).\n- ALSA: hda/realtek: GA503 use same quirks as GA401 (git-fixes).\n- ALSA: hda/realtek: Headphone volume is controlled by Front mixer (git-fixes).\n- ALSA: hda/realtek: Re-order ALC269 ASUS quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC269 Acer quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC269 Dell quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC269 HP quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC269 Lenovo quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC269 Sony quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC662 quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC882 Acer quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC882 Clevo quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC882 Sony quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order remaining ALC269 quirk table entries (git-fixes).\n- ALSA: hda/realtek: Remove redundant entry for ALC861 Haier/Uniwill devices (git-fixes).\n- ALSA: hda/realtek: apply pin quirk for XiaomiNotebook Pro (git-fixes).\n- ALSA: hda/realtek: call alc_update_headset_mode() in hp_automute_hook (git-fixes).\n- ALSA: hda/realtek: fix a determine_headset_type issue for a Dell AIO (git-fixes).\n- ALSA: hda/realtek: fix mic boost on Intel NUC 8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs and speaker for HP Zbook Fury 15 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs and speaker for HP Zbook Fury 17 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs and speaker for HP Zbook G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP 440 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP 640 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP 840 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP 850 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP 855 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP ProBook 445 G7 (git-fixes).\n- ALSA: hda/realtek: fix static noise on ALC285 Lenovo laptops (git-fixes).\n- ALSA: hda/realtek: reset eapd coeff to default value for alc287 (git-fixes).\n- ALSA: hda/realtek: the bass speaker can\u0027t output sound on Yoga 9i (git-fixes).\n- ALSA: hda: Add missing sanity checks in PM prepare/complete callbacks (git-fixes).\n- ALSA: hda: Avoid spurious unsol event handling during S3/S4 (bsc#1182377).\n- ALSA: hda: Avoid spurious unsol event handling during S3/S4 (git-fixes).\n- ALSA: hda: Drop the BATCH workaround for AMD controllers (git-fixes).\n- ALSA: hda: Flush pending unsolicited events before suspend (bsc#1182377).\n- ALSA: hda: Re-add dropped snd_poewr_change_state() calls (git-fixes).\n- ALSA: hda: fixup headset for ASUS GU502 laptop (git-fixes).\n- ALSA: hda: fixup headset for ASUS GU502 laptop (git-fixes).\n- ALSA: hda: generic: Fix the micmute led init state (git-fixes).\n- ALSA: hda: generic: change the DAC ctl name for LO+SPK or LO+HP (git-fixes).\n- ALSA: hda: ignore invalid NHLT table (git-fixes).\n- ALSA: hdsp: do not disable if not enabled (git-fixes).\n- ALSA: hdspm: do not disable if not enabled (git-fixes).\n- ALSA: intel8x0: Do not update period unless prepared (git-fixes).\n- ALSA: line6: Fix racy initialization of LINE6 MIDI (git-fixes).\n- ALSA: rme9652: do not disable if not enabled (git-fixes).\n- ALSA: sb: Fix two use after free in snd_sb_qsound_build (git-fixes).\n- ALSA: usb-audio: Add DJM-450 to the quirks table (git-fixes).\n- ALSA: usb-audio: Add DJM450 to Pioneer format quirk (git-fixes).\n- ALSA: usb-audio: Add DJM450 to Pioneer format quirk (git-fixes).\n- ALSA: usb-audio: Add DJM750 to Pioneer mixer quirk (git-fixes).\n- ALSA: usb-audio: Add MIDI quirk for Vox ToneLab EX (git-fixes).\n- ALSA: usb-audio: Add Pioneer DJM-850 to quirks-table (git-fixes).\n- ALSA: usb-audio: Add dB range mapping for Sennheiser Communications Headset PC 8 (git-fixes).\n- ALSA: usb-audio: Add error checks for usb_driver_claim_interface() calls (git-fixes).\n- ALSA: usb-audio: Add implicit feeback support for the BOSS GT-1 (git-fixes).\n- ALSA: usb-audio: Add support for Pioneer DJM-750 (git-fixes).\n- ALSA: usb-audio: Add support for many Roland devices\u0027 implicit feedback quirks (git-fixes).\n- ALSA: usb-audio: Apply implicit feedback mode for BOSS devices (git-fixes).\n- ALSA: usb-audio: Apply sample rate quirk to Logitech Connect (git-fixes).\n- ALSA: usb-audio: Carve out connector value checking into a helper (git-fixes).\n- ALSA: usb-audio: Check connector value on resume (git-fixes).\n- ALSA: usb-audio: Configure Pioneer DJM-850 samplerate (git-fixes).\n- ALSA: usb-audio: Convert remaining strlcpy() to strscpy() (git-fixes).\n- ALSA: usb-audio: Convert the last strlcpy() usage (git-fixes).\n- ALSA: usb-audio: DJM-750: ensure format is set (git-fixes).\n- ALSA: usb-audio: Declare Pioneer DJM-850 mixer controls (git-fixes).\n- ALSA: usb-audio: Drop implicit fb quirk entries dubbed for capture (git-fixes).\n- ALSA: usb-audio: Explicitly set up the clock selector (git-fixes).\n- ALSA: usb-audio: Fix \u0027RANGE setting not yet supported\u0027 errors (git-fixes).\n- ALSA: usb-audio: Fix Pioneer DJM devices URB_CONTROL request direction to set samplerate (git-fixes).\n- ALSA: usb-audio: Fix Pioneer DJM devices URB_CONTROL request direction to set samplerate (git-fixes).\n- ALSA: usb-audio: Fix implicit sync clearance at stopping stream (git-fixes).\n- ALSA: usb-audio: Fix potential out-of-bounce access in MIDI EP parser (git-fixes).\n- ALSA: usb-audio: Fix unintentional sign extension issue (git-fixes).\n- ALSA: usb-audio: Generic application of implicit fb to Roland/BOSS devices (git-fixes).\n- ALSA: usb-audio: Re-apply implicit feedback mode to Pioneer devices (git-fixes).\n- ALSA: usb-audio: Remove redundant assignment to len (git-fixes).\n- ALSA: usb-audio: Skip probe of UA-101 devices (git-fixes).\n- ALSA: usb-audio: Skip the clock selector inquiry for single connections (git-fixes).\n- ALSA: usb-audio: Validate MS endpoint descriptors (git-fixes).\n- ALSA: usb-audio: add mixer quirks for Pioneer DJM-900NXS2 (git-fixes).\n- ALSA: usb-audio: fix NULL ptr dereference in usb_audio_probe (bsc#1182552).\n- ALSA: usb-audio: fix Pioneer DJM-850 control label info (git-fixes).\n- ALSA: usb-audio: fix control-request direction (git-fixes).\n- ALSA: usb-audio: fix use after free in usb_audio_disconnect (bsc#1182552).\n- ALSA: usb-audio: generate midi streaming substream names from jack names (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix device hang with ehci-pci (git-fixes).\n- ALSA: usb-audio: scarlett2: Improve driver startup messages (git-fixes).\n- ALSA: usb-audio: scarlett2: snd_scarlett_gen2_controls_create() can be static (git-fixes).\n- ALSA: usb-audio: use usb headers rather than define structs locally (git-fixes).\n- ALSA: usb: Use DIV_ROUND_UP() instead of open-coding it (git-fixes).\n- ALSA: usb: midi: do not return -ENOMEM when usb_urb_ep_type_check fails (git-fixes).\n- ASoC: Intel: Add DMI quirk table to soc_intel_is_byt_cr() (git-fixes).\n- ASoC: Intel: boards: sof-wm8804: add check for PLL setting (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for ARCHOS Cesium 140 (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for the Acer One S1002 tablet (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for the Chuwi Hi8 tablet (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for the Estar Beauty HD MID 7316R tablet (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for the Voyo Winpad A15 tablet (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Enable jack-detect support on Asus T100TAF (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Fix HP Pavilion x2 10-p0XX OVCD current threshold (git-fixes).\n- ASoC: Intel: bytcr_rt5651: Add quirk for the Jumper EZpad 7 tablet (git-fixes).\n- ASoC: Intel: kbl_da7219_max98927: Fix kabylake_ssp_fixup function (git-fixes).\n- ASoC: Intel: sof_sdw: add quirk for HP Spectre x360 convertible (git-fixes).\n- ASoC: Intel: sof_sdw: add quirk for new ADL-P Rvp (git-fixes).\n- ASoC: Intel: sof_sdw: reorganize quirks by generation (git-fixes).\n- ASoC: SOF: Intel: HDA: fix core status verification (git-fixes).\n- ASoC: SOF: Intel: HDA: fix core status verification (git-fixes).\n- ASoC: SOF: Intel: hda: remove unnecessary parentheses (git-fixes).\n- ASoC: SOF: Intel: unregister DMIC device on probe error (git-fixes).\n- ASoC: SOF: intel: fix wrong poll bits in dsp power down (git-fixes).\n- ASoC: ak4458: Add MODULE_DEVICE_TABLE (git-fixes).\n- ASoC: ak5558: Add MODULE_DEVICE_TABLE (git-fixes).\n- ASoC: ak5558: Fix s/show/slow/ typo (git-fixes).\n- ASoC: ak5558: correct reset polarity (git-fixes).\n- ASoC: codecs: wcd934x: add a sanity check in set channel map (git-fixes).\n- ASoC: cs35l33: fix an error code in probe() (git-fixes).\n- ASoC: cs42l42: Always wait at least 3ms after reset (git-fixes).\n- ASoC: cs42l42: Do not enable/disable regulator at Bias Level (git-fixes).\n- ASoC: cs42l42: Fix Bitclock polarity inversion (git-fixes).\n- ASoC: cs42l42: Fix channel width support (git-fixes).\n- ASoC: cs42l42: Fix mixer volume control (git-fixes).\n- ASoC: cs42l42: Regmap must use_single_read/write (git-fixes).\n- ASoC: cygnus: fix for_each_child.cocci warnings (git-fixes).\n- ASoC: es8316: Simplify adc_pga_gain_tlv table (git-fixes).\n- ASoC: fsl_esai: Fix TDM slot setup for I2S mode (git-fixes).\n- ASoC: fsl_ssi: Fix TDM slot setup for I2S mode (git-fixes).\n- ASoC: intel: atom: Remove 44100 sample-rate from the media and deep-buffer DAI descriptions (git-fixes).\n- ASoC: intel: atom: Stop advertising non working S24LE support (git-fixes).\n- ASoC: max98373: Added 30ms turn on/off time delay (git-fixes).\n- ASoC: max98373: Changed amp shutdown register as volatile (git-fixes).\n- ASoC: qcom: lpass-cpu: Fix lpass dai ids parse (git-fixes).\n- ASoC: qcom: sdm845: Fix array out of bounds access (git-fixes).\n- ASoC: qcom: sdm845: Fix array out of range on rx slim channels (git-fixes).\n- ASoC: rsnd: call rsnd_ssi_master_clk_start() from rsnd_ssi_init() (git-fixes).\n- ASoC: rsnd: check all BUSIF status when error (git-fixes).\n- ASoC: rsnd: core: Check convert rate in rsnd_hw_params (git-fixes).\n- ASoC: rt1015: fix i2c communication error (git-fixes).\n- ASoC: rt286: Generalize support for ALC3263 codec (git-fixes).\n- ASoC: rt286: Make RT286_SET_GPIO_* readable and writable (git-fixes).\n- ASoC: rt5640: Fix dac- and adc- vol-tlv values being off by a factor of 10 (git-fixes).\n- ASoC: rt5651: Fix dac- and adc- vol-tlv values being off by a factor of 10 (git-fixes).\n- ASoC: rt5659: Update MCLK rate in set_sysclk() (git-fixes).\n- ASoC: rt5670: Add a quirk for the Dell Venue 10 Pro 5055 (git-fixes).\n- ASoC: rt5670: Add emulated \u0027DAC1 Playback Switch\u0027 control (git-fixes).\n- ASoC: rt5670: Remove \u0027HP Playback Switch\u0027 control (git-fixes).\n- ASoC: rt5670: Remove \u0027OUT Channel Switch\u0027 control (git-fixes).\n- ASoC: rt5670: Remove ADC vol-ctrl mute bits poking from Sto1 ADC mixer settings (git-fixes).\n- ASoC: rt711: add snd_soc_component remove callback (git-fixes).\n- ASoC: samsung: snow: remove useless test (git-fixes).\n- ASoC: samsung: tm2_wm5110: check of of_parse return value (git-fixes).\n- ASoC: sgtl5000: set DAP_AVC_CTRL register to correct default value on probe (git-fixes).\n- ASoC: simple-card-utils: Do not handle device clock (git-fixes).\n- ASoC: simple-card: fix possible uninitialized single_cpu local variable (git-fixes).\n- ASoC: soc-core kABI workaround (git-fixes).\n- ASoC: soc-core: Prevent warning if no DMI table is present (git-fixes).\n- ASoC: sunxi: sun4i-codec: fill ASoC card owner (git-fixes).\n- ASoC: wm8960: Fix wrong bclk and lrclk with pll enabled for some chips (git-fixes).\n- ASoC: wm8960: Remove bitclk relax condition in wm8960_configure_sysclk (git-fixes).\n- Bluetooth: Fix incorrect status handling in LE PHY UPDATE event (git-fixes).\n- Bluetooth: Fix null pointer dereference in amp_read_loc_assoc_final_data (git-fixes).\n- Bluetooth: L2CAP: Fix handling LE modes by L2CAP_OPTIONS (git-fixes).\n- Bluetooth: SMP: Fail if remote and local public keys are identical (git-fixes).\n- Bluetooth: Set CONF_NOT_COMPLETE as l2cap_chan default (git-fixes).\n- Bluetooth: avoid deadlock between hci_dev-\u003elock and socket lock (git-fixes).\n- Bluetooth: btqca: Add valid le states quirk (git-fixes).\n- Bluetooth: btusb: Enable quirk boolean flag for Mediatek Chip (git-fixes).\n- Bluetooth: check for zapped sk before connecting (git-fixes).\n- Bluetooth: hci_h5: Set HCI_QUIRK_SIMULTANEOUS_DISCOVERY for btrtl (git-fixes).\n- Bluetooth: initialize skb_queue_head at l2cap_chan_create() (git-fixes).\n- Drivers: hv: vmbus: Fix Suspend-to-Idle for Generation-2 VM (git-fixes).\n- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185725).\n- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185725).\n- Drivers: hv: vmbus: Use after free in __vmbus_open() (git-fixes).\n- EDAC/amd64: Check for memory before fully initializing an instance (bsc#1183815).\n- EDAC/amd64: Get rid of the ECC disabled long message (bsc#1183815).\n- EDAC/amd64: Use cached data when checking for ECC (bsc#1183815).\n- Goodix Fingerprint device is not a modem (git-fixes).\n- HID: alps: fix error return code in alps_input_configured() (git-fixes).\n- HID: google: add don USB id (git-fixes).\n- HID: i2c-hid: Add I2C_HID_QUIRK_NO_IRQ_AFTER_RESET for ITE8568 EC on Voyo Winpad A15 (git-fixes).\n- HID: mf: add support for 0079:1846 Mayflash/Dragonrise USB Gamecube Adapter (git-fixes).\n- HID: plantronics: Workaround for double volume key presses (git-fixes).\n- HID: wacom: Assign boolean values to a bool variable (git-fixes).\n- HID: wacom: set EV_KEY and EV_ABS only for non-HID_GENERIC type of devices (git-fixes).\n- HSI: Fix PM usage counter unbalance in ssi_hw_init (git-fixes).\n- IB/hfi1: Fix probe time panic when AIP is enabled with a buggy BIOS (jsc#SLE-13208).\n- IB/hfi1: Rework AIP and VNIC dummy netdev usage (jsc#SLE-13208).\n- Input: applespi - do not wait for responses to commands indefinitely (git-fixes).\n- Input: elantech - fix protocol errors for some trackpoints in SMBus mode (git-fixes).\n- Input: elants_i2c - do not bind to i2c-hid compatible ACPI instantiated devices (git-fixes).\n- Input: i8042 - fix Pegatron C15B ID entry (git-fixes).\n- Input: nspire-keypad - enable interrupts only when opened (git-fixes).\n- Input: s6sy761 - fix coordinate read bit shift (git-fixes).\n- Input: silead - add workaround for x86 BIOS-es which bring the chip up in a stuck state (git-fixes).\n- KEYS: trusted: Fix TPM reservation for seal/unseal (git-fixes).\n- KEYS: trusted: Fix memory leak on object td (git-fixes).\n- KVM x86: Extend AMD specific guest behavior to Hygon virtual CPUs (bsc#1183447).\n- KVM: PPC: Book3S HV P9: Restore host CTRL SPR after guest exit (bsc#1156395).\n- KVM: PPC: Make the VMX instruction emulation routines static (bsc#1156395).\n- KVM: SVM: Clear the CR4 register on reset (bsc#1183252).\n- KVM: kvmclock: Fix vCPUs \u003e 64 can\u0027t be online/hotpluged (bsc#1152489).\n- KVM: nVMX: Properly handle userspace interrupt window request (bsc#1183427).\n- KVM: s390: fix guarded storage control register handling (bsc#1133021).\n- KVM: x86: Add helpers to perform CPUID-based guest vendor check (bsc#1183445).\n- KVM: x86: Allow guests to see MSR_IA32_TSX_CTRL even if tsx=off (bsc#1183287).\n- KVM: x86: Allow guests to see MSR_IA32_TSX_CTRL even if tsx=off (bsc#1183323).\n- KVM: x86: Expose XSAVEERPTR to the guest (jsc#SLE-13573).\n- KVM: x86: Return -E2BIG when KVM_GET_SUPPORTED_CPUID hits max entries (bsc#1183428).\n- KVM: x86: Set so called \u0027reserved CR3 bits in LM mask\u0027 at vCPU reset (bsc#1183288).\n- KVM: x86: Set so called \u0027reserved CR3 bits in LM mask\u0027 at vCPU reset (bsc#1183324).\n- KVM: x86: do not reset microcode version on INIT or RESET (bsc#1183412).\n- KVM: x86: list MSR_IA32_UCODE_REV as an emulated MSR (bsc#1183369).\n- NFC: nci: fix memory leak in nci_allocate_device (git-fixes).\n- PCI/AER: Add RCEC AER error injection support (bsc#1174426).\n- PCI/AER: Add pcie_walk_rcec() to RCEC AER handling (bsc#1174426).\n- PCI/AER: Clear AER status from Root Port when resetting Downstream Port (bsc#1174426).\n- PCI/AER: Specify the type of Port that was reset (bsc#1174426).\n- PCI/AER: Use \u0027aer\u0027 variable for capability offset (bsc#1174426).\n- PCI/AER: Write AER Capability only when we control it (bsc#1174426).\n- PCI/ERR: Add pci_walk_bridge() to pcie_do_recovery() (bsc#1174426).\n- PCI/ERR: Add pcie_link_rcec() to associate RCiEPs (bsc#1174426).\n- PCI/ERR: Avoid negated conditional for clarity (bsc#1174426).\n- PCI/ERR: Bind RCEC devices to the Root Port driver (bsc#1174426).\n- PCI/ERR: Bind RCEC devices to the Root Port driver (jsc#SLE-13736 jsc#SLE-14845).\n- PCI/ERR: Cache RCEC EA Capability offset in pci_init_capabilities() (bsc#1174426).\n- PCI/ERR: Clear AER status only when we control AER (bsc#1174426).\n- PCI/ERR: Clear PCIe Device Status errors only if OS owns AER (bsc#1174426).\n- PCI/ERR: Clear status of the reporting device (bsc#1174426).\n- PCI/ERR: Recover from RCEC AER errors (bsc#1174426).\n- PCI/ERR: Recover from RCiEP AER errors (bsc#1174426).\n- PCI/ERR: Rename reset_link() to reset_subordinates() (bsc#1174426).\n- PCI/ERR: Retain status from error notification (bsc#1174426).\n- PCI/ERR: Simplify by computing pci_pcie_type() once (bsc#1174426).\n- PCI/ERR: Simplify by using pci_upstream_bridge() (bsc#1174426).\n- PCI/ERR: Use \u0027bridge\u0027 for clarity in pcie_do_recovery() (bsc#1174426).\n- PCI/PME: Add pcie_walk_rcec() to RCEC PME handling (bsc#1174426).\n- PCI/RCEC: Fix RCiEP device to RCEC association (git-fixes).\n- PCI/RCEC: Fix RCiEP device to RCEC association (jsc#SLE-13736 jsc#SLE-14845 git-fixes).\n- PCI/portdrv: Report reset for frozen channel (bsc#1174426).\n- PCI: Add a REBAR size quirk for Sapphire RX 5600 XT Pulse (git-fixes).\n- PCI: Add function 1 DMA alias quirk for Marvell 9215 SATA controller (git-fixes).\n- PCI: Allow VPD access for QLogic ISP2722 (git-fixes).\n- PCI: Fix pci_register_io_range() memory leak (git-fixes).\n- PCI: PM: Do not read power state in pci_enable_device_flags() (git-fixes).\n- PCI: Release OF node in pci_scan_device()\u0027s error path (git-fixes).\n- PCI: designware-ep: Fix the Header Type check (git-fixes).\n- PCI: dwc: Move iATU detection earlier (git-fixes).\n- PCI: endpoint: Fix missing destroy_workqueue() (git-fixes).\n- PCI: iproc: Fix return value of iproc_msi_irq_domain_alloc() (git-fixes).\n- PCI: keystone: Let AM65 use the pci_ops defined in pcie-designware-host.c (git-fixes).\n- PCI: mediatek: Add missing of_node_put() to fix reference leak (git-fixes).\n- PCI: tegra: Fix ASPM-L1SS advertisement disable code (git-fixes).\n- PCI: tegra: Move \u0027dbi\u0027 accesses to post common DWC initialization (git-fixes).\n- PCI: thunder: Fix compile testing (git-fixes).\n- PCI: xgene-msi: Fix race in installing chained irq handler (git-fixes).\n- PM / devfreq: Use more accurate returned new_freq as resume_freq (git-fixes).\n- PM: EM: postpone creating the debugfs dir till fs_initcall (git-fixes).\n- PM: runtime: Add documentation for pm_runtime_resume_and_get() (git-fixes).\n- PM: runtime: Add pm_runtime_resume_and_get to deal with usage counter (bsc#1183366).\n- PM: runtime: Fix ordering in pm_runtime_get_suppliers() (git-fixes).\n- PM: runtime: Fix ordering in pm_runtime_get_suppliers() (git-fixes).\n- PM: runtime: Fix race getting/putting suppliers at probe (git-fixes).\n- Platform: OLPC: Fix probe error handling (git-fixes).\n- RAS/CEC: Correct ce_add_elem()\u0027s returned values (bsc#1152489).\n- RDMA/addr: create addr_wq with WQ_MEM_RECLAIM flag (bsc#1183346).\n- RDMA/cm: Fix IRQ restore in ib_send_cm_sidr_rep (jsc#SLE-15176).\n- RDMA/core: create ib_cm with WQ_MEM_RECLAIM flag (bsc#1183346).\n- RDMA/hns: Delete redundant abnormal interrupt status (git-fixes).\n- RDMA/hns: Delete redundant condition judgment related to eq (git-fixes).\n- RDMA/mlx5: Fix drop packet rule in egress table (jsc#SLE-15175).\n- RDMA/qedr: Fix error return code in qedr_iw_connect() (jsc#SLE-8215).\n- RDMA/rtrs-clt: Close rtrs client conn before destroying rtrs clt session files (jsc#SLE-15176).\n- RDMA/rtrs-clt: destroy sysfs after removing session from active list (jsc#SLE-15176).\n- RDMA/srp: Fix support for unpopulated and unbalanced NUMA nodes (bsc#1169709)\n- RDMA/srp: Fix support for unpopulated and unbalanced NUMA nodes (bsc#1169709)\n- RDMA/srpt: Fix error return code in srpt_cm_req_recv() (git-fixes).\n- Re-enable yenta socket driver for x86_64 (bsc#1186349)\n- SUNRPC in case of backlog, hand free slots directly to waiting task (bsc#1185428).\n- USB: Add LPM quirk for Lenovo ThinkPad USB-C Dock Gen2 Ethernet (git-fixes).\n- USB: Add reset-resume quirk for WD19\u0027s Realtek Hub (git-fixes).\n- USB: CDC-ACM: fix poison/unpoison imbalance (bsc#1184984).\n- USB: CDC-ACM: fix poison/unpoison imbalance (git-fixes).\n- USB: cdc-acm: downgrade message to debug (git-fixes).\n- USB: cdc-acm: fix TIOCGSERIAL implementation (git-fixes).\n- USB: cdc-acm: fix double free on probe failure (git-fixes).\n- USB: cdc-acm: fix unprivileged TIOCCSERIAL (git-fixes).\n- USB: cdc-acm: fix use-after-free after probe failure (git-fixes).\n- USB: cdc-acm: untangle a circular dependency between callback and softint (git-fixes).\n- USB: gadget: u_ether: Fix a configfs return code (git-fixes).\n- USB: gadget: udc: fix wrong pointer passed to IS_ERR() and PTR_ERR() (git-fixes).\n- USB: quirks: ignore remote wake-up on Fibocom L850-GL LTE modem (git-fixes).\n- USB: replace hardcode maximum usb string length by definition (git-fixes).\n- USB: serial: ark3116: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: ch341: add new Product ID (git-fixes).\n- USB: serial: cp210x: add ID for Acuity Brands nLight Air Adapter (git-fixes).\n- USB: serial: cp210x: add some more GE USB IDs (git-fixes).\n- USB: serial: f81232: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: f81534: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: fix return value for unsupported ioctls (git-fixes).\n- USB: serial: io_edgeport: fix memory leak in edge_startup (git-fixes).\n- USB: serial: mos7720: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: opticon: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: pl2303: add support for PL2303HXN (bsc#1186320).\n- USB: serial: pl2303: fix line-speed handling on newer chips (bsc#1186320).\n- USB: serial: quatech2: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: ssu100: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: ti_usb_3410_5052: fix TIOCSSERIAL permission check (git-fixes).\n- USB: serial: usb_wwan: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: usb_wwan: fix TIOCSSERIAL jiffies conversions (git-fixes).\n- USB: serial: usb_wwan: fix unprivileged TIOCCSERIAL (git-fixes).\n- USB: usblp: fix a hang in poll() if disconnected (git-fixes).\n- Update bug reference for USB-audio fixes (bsc#1182552 bsc#1183598)\n- amd/amdgpu: Disable VCN DPG mode for Picasso (git-fixes).\n- amdgpu: avoid incorrect %hu format string (git-fixes).\n- apparmor: Fix aa_label refcnt leak in policy_update (git-fixes).\n- apparmor: check/put label on apparmor_sk_clone_security() (git-fixes).\n- appletalk: Fix skb allocation size in loopback case (git-fixes).\n- arm64: make STACKPROTECTOR_PER_TASK configurable (bsc#1181862).\n- ata: ahci: Disable SXS for Hisilicon Kunpeng920 (git-fixes).\n- ata: libahci_platform: fix IRQ check (git-fixes).\n- ath10k: Fix a use after free in ath10k_htc_send_bundle (git-fixes).\n- ath10k: Fix ath10k_wmi_tlv_op_pull_peer_stats_info() unlock without lock (git-fixes).\n- ath10k: fix wmi mgmt tx queue full due to race condition (git-fixes).\n- ath10k: hold RCU lock when calling ieee80211_find_sta_by_ifaddr() (git-fixes).\n- ath9k: Fix error check in ath9k_hw_read_revisions() for PCI devices (git-fixes).\n- ath9k: fix transmitting to stations in dynamic SMPS mode (git-fixes).\n- atl1c: fix error return code in atl1c_probe() (git-fixes).\n- atl1e: fix error return code in atl1e_probe() (git-fixes).\n- backlight: journada720: Fix Wmisleading-indentation warning (git-fixes).\n- batman-adv: initialize \u0027struct batadv_tvlv_tt_vlan_data\u0027-\u003ereserved field (git-fixes).\n- binfmt_misc: fix possible deadlock in bm_register_write (git-fixes).\n- binfmt_misc: fix possible deadlock in bm_register_write (git-fixes).\n- blk-iocost: ioc_pd_free() shouldn\u0027t assume irq disabled (git-fixes).\n- blk-mq: plug request for shared sbitmap (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).\n- blk-mq: set default elevator as deadline in case of hctx shared tagset (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).\n- blkcg: fix memleak for iolatency (git-fixes).\n- block, bfq: set next_rq to waker_bfqq-\u003enext_rq in waker injection (bsc#1168838).\n- block: fix get_max_io_size() (git-fixes).\n- block: recalculate segment count for multi-segment discards correctly (bsc#1184724).\n- block: rsxx: fix error return code of rsxx_pci_probe() (git-fixes).\n- block: rsxx: select CONFIG_CRC32 (git-fixes).\n- bluetooth: eliminate the potential race condition when removing the HCI controller (git-fixes).\n- bnxt_en: Fix RX consumer index logic in the error path (git-fixes).\n- bnxt_en: Fix RX consumer index logic in the error path (git-fixes).\n- bnxt_en: fix ternary sign extension bug in bnxt_show_temp() (git-fixes).\n- bnxt_en: reliably allocate IRQ table on reset to avoid crash (jsc#SLE-8371 bsc#1153274).\n- bnxt_en: reverse order of TX disable and carrier off (git-fixes).\n- bpf, sockmap: Fix sk-\u003eprot unhash op reset (bsc#1155518).\n- bpf,x64: Pad NOPs to make images converge more easily (bsc#1178163).\n- bpf: Add sanity check for upper ptr_limit (bsc#1183686 bsc#1183775).\n- bpf: Avoid warning when re-casting __bpf_call_base into __bpf_call_base_args (bsc#1155518).\n- bpf: Declare __bpf_free_used_maps() unconditionally (bsc#1155518).\n- bpf: Do not do bpf_cgroup_storage_set() for kuprobe/tp programs (bsc#1155518).\n- bpf: Enforce that struct_ops programs be GPL-only (bsc#1177028).\n- bpf: Fix 32 bit src register truncation on div/mod (bsc#1184170).\n- bpf: Fix an unitialized value in bpf_iter (bsc#1177028).\n- bpf: Fix leakage of uninitialized bpf stack under speculation (bsc#1155518).\n- bpf: Fix masking negation logic upon negative dst register (bsc#1155518).\n- bpf: Fix propagation of 32 bit unsigned bounds from 64 bit bounds (bsc#1177028).\n- bpf: Fix verifier jsgt branch analysis on max bound (bsc#1155518).\n- bpf: Refcount task stack in bpf_get_task_stack (bsc#1177028).\n- bpf: Remove MTU check in __bpf_skb_max_len (bsc#1155518).\n- bpf: Simplify alu_limit masking for pointer arithmetic (bsc#1183686 bsc#1183775).\n- bpf: link: Refuse non-O_RDWR flags in BPF_OBJ_GET (bsc#1177028).\n- bpf_lru_list: Read double-checked variable once without lock (bsc#1155518).\n- brcmfmac: Add DMI nvram filename quirk for Predia Basic tablet (git-fixes).\n- brcmfmac: Add DMI nvram filename quirk for Voyo winpad A15 tablet (git-fixes).\n- brcmfmac: clear EAP/association status bits on linkdown events (git-fixes).\n- bsg: free the request before return error code (git-fixes).\n- btrfs: abort the transaction if we fail to inc ref in btrfs_copy_root (bsc#1184217).\n- btrfs: always pin deleted leaves when there are active tree mod log users (bsc#1184224).\n- btrfs: fix exhaustion of the system chunk array due to concurrent allocations (bsc#1183386).\n- btrfs: fix extent buffer leak on failure to copy root (bsc#1184218).\n- btrfs: fix qgroup data rsv leak caused by falloc failure (bsc#1185549).\n- btrfs: fix race between swap file activation and snapshot creation (bsc#1185587).\n- btrfs: fix race between swap file activation and snapshot creation (bsc#1185587).\n- btrfs: fix race between transaction aborts and fsyncs leading to use-after-free (bsc#1186441).\n- btrfs: fix race between transaction aborts and fsyncs leading to use-after-free (bsc#1186441).\n- btrfs: fix race between writes to swap files and scrub (bsc#1185586).\n- btrfs: fix race between writes to swap files and scrub (bsc#1185586).\n- btrfs: fix race when cloning extent buffer during rewind of an old root (bsc#1184193).\n- btrfs: fix race when picking most recent mod log operation for an old root (bsc#1186439).\n- btrfs: fix race when picking most recent mod log operation for an old root (bsc#1186439).\n- btrfs: fix stale data exposure after cloning a hole with NO_HOLES enabled (bsc#1184220).\n- btrfs: fix subvolume/snapshot deletion not triggered on mount (bsc#1184219).\n- btrfs: track qgroup released data in own variable in insert_prealloc_file_extent (bsc#1185549).\n- bus: fsl-mc: add the dpdbg device type (bsc#1185670).\n- bus: fsl-mc: list more commands as accepted through the ioctl (bsc#1185670).\n- bus: omap_l3_noc: mark l3 irqs as IRQF_NO_THREAD (git-fixes).\n- bus: qcom: Put child node before return (git-fixes).\n- bus: ti-sysc: Fix warning on unbind if reset is not deasserted (git-fixes).\n- can: c_can: move runtime PM enable/disable to c_can_platform (git-fixes).\n- can: c_can_pci: c_can_pci_remove(): fix use-after-free (git-fixes).\n- can: flexcan: assert FRZ bit in flexcan_chip_freeze() (git-fixes).\n- can: flexcan: enable RX FIFO after FRZ/HALT valid (git-fixes).\n- can: flexcan: flexcan_chip_freeze(): fix chip freeze for missing bitrate (git-fixes).\n- can: flexcan: invoke flexcan_chip_freeze() to enter freeze mode (git-fixes).\n- can: m_can: m_can_do_rx_poll(): fix extraneous msg loss warning (git-fixes).\n- can: peak_usb: Revert \u0027can: peak_usb: add forgotten supported devices\u0027 (git-fixes).\n- can: peak_usb: add forgotten supported devices (git-fixes).\n- can: skb: can_skb_set_owner(): fix ref counting if socket was closed before setting skb ownership (git-fixes).\n- cdc-acm: fix BREAK rx code path adding necessary calls (git-fixes).\n- cdc-wdm: untangle a circular dependency between callback and softint (git-fixes).\n- ceph: do not clobber i_snap_caps on non-I_NEW inode (bsc#1186501).\n- ceph: fix inode leak on getattr error in __fh_to_dentry (bsc#1186501).\n- ceph: fix up error handling with snapdirs (bsc#1186501).\n- ceph: only check pool permissions for regular files (bsc#1186501).\n- cfg80211: remove WARN_ON() in cfg80211_sme_connect (git-fixes).\n- cfg80211: scan: drop entry from hidden_list on overflow (git-fixes).\n- ch_ktls: Fix kernel panic (jsc#SLE-15131).\n- ch_ktls: do not send snd_una update to TCB in middle (jsc#SLE-15131).\n- ch_ktls: fix device connection close (jsc#SLE-15131).\n- ch_ktls: fix enum-conversion warning (jsc#SLE-15129).\n- ch_ktls: tcb close causes tls connection failure (jsc#SLE-15131).\n- cifs: New optype for session operations (bsc#1181507).\n- cifs: Tracepoints and logs for tracing credit changes (bsc#1181507).\n- cifs: change noisy error message to FYI (bsc#1181507).\n- cifs: check pointer before freeing (bsc#1183534).\n- cifs: do not send close in compound create+close requests (bsc#1181507).\n- cifs: print MIDs in decimal notation (bsc#1181507).\n- cifs: return proper error code in statfs(2) (bsc#1181507).\n- cifs_debug: use %pd instead of messing with -\u003ed_name (bsc#1181507).\n- clk: exynos7: Mark aclk_fsys1_200 as critical (git-fixes).\n- clk: fix invalid usage of list cursor in register (git-fixes).\n- clk: fix invalid usage of list cursor in unregister (git-fixes).\n- clk: mvebu: armada-37xx-periph: Fix switching CPU freq from 250 Mhz to 1 GHz (git-fixes).\n- clk: mvebu: armada-37xx-periph: Fix workaround for switching from L1 to L0 (git-fixes).\n- clk: mvebu: armada-37xx-periph: remove .set_parent method for CPU PM clock (git-fixes).\n- clk: qcom: a53-pll: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- clk: socfpga: arria10: Fix memory leak of socfpga_clk on error return (git-fixes).\n- clk: socfpga: fix iomem pointer cast on 64-bit (git-fixes).\n- clk: uniphier: Fix potential infinite loop (git-fixes).\n- clk: zynqmp: move zynqmp_pll_set_mode out of round_rate callback (git-fixes).\n- completion: Drop init_completion define (git-fixes).\n- configfs: fix a use-after-free in __configfs_open_file (git-fixes).\n- coresight: etm4x: Fix issues on trcseqevr access (git-fixes).\n- coresight: etm4x: Fix save and restore of TRCVMIDCCTLR1 register (git-fixes).\n- coresight: remove broken __exit annotations (git-fixes).\n- coresight: tmc-etr: Fix barrier packet insertion for perf buffer (git-fixes).\n- cpufreq: Kconfig: fix documentation links (git-fixes).\n- cpufreq: armada-37xx: Fix determining base CPU frequency (git-fixes).\n- cpufreq: armada-37xx: Fix driver cleanup when registration failed (git-fixes).\n- cpufreq: armada-37xx: Fix setting TBG parent for load levels (git-fixes).\n- cpufreq: armada-37xx: Fix the AVS value for load L1 (git-fixes).\n- cpufreq: intel_pstate: Add Icelake servers support in no-HWP mode (bsc#1185758).\n- cpuidle/pseries: Fixup CEDE0 latency only for POWER10 onwards (bsc#1185550 ltc#192610).\n- crypto: api - check for ERR pointers in crypto_destroy_tfm() (git-fixes).\n- crypto: arm/curve25519 - Move \u0027.fpu\u0027 after \u0027.arch\u0027 (git-fixes).\n- crypto: chelsio - Read rxchannel-id from firmware (git-fixes).\n- crypto: mips/poly1305 - enable for all MIPS processors (git-fixes).\n- crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init (git-fixes).\n- crypto: qat - Fix a double free in adf_create_ring (git-fixes).\n- crypto: qat - do not release uninitialized resources (git-fixes).\n- crypto: qat - fix error path in adf_isr_resource_alloc() (git-fixes).\n- crypto: qat - fix unmap invalid dma address (git-fixes).\n- crypto: rng - fix crypto_rng_reset() refcounting when !CRYPTO_STATS (git-fixes).\n- crypto: stm32/cryp - Fix PM reference leak on stm32-cryp.c (git-fixes).\n- crypto: stm32/hash - Fix PM reference leak on stm32-hash.c (git-fixes).\n- crypto: tcrypt - avoid signed overflow in byte count (git-fixes).\n- cxgb4/chtls/cxgbit: Keeping the max ofld immediate data size same in cxgb4 and ulds (git-fixes).\n- cxgb4/chtls/cxgbit: Keeping the max ofld immediate data size same in cxgb4 and ulds (git-fixes).\n- cxgb4: Fix unintentional sign extension issues (git-fixes).\n- cxgb4: avoid collecting SGE_QBASE regs during traffic (git-fixes).\n- dm era: Fix bitset memory leaks (git-fixes).\n- dm era: Recover committed writeset after crash (git-fixes).\n- dm era: Reinitialize bitset cache before digesting a new writeset (git-fixes).\n- dm era: Update in-core bitset after committing the metadata (git-fixes).\n- dm era: Use correct value size in equality function of writeset tree (git-fixes).\n- dm era: Verify the data block size hasn\u0027t changed (git-fixes).\n- dm era: only resize metadata in preresume (git-fixes).\n- dm integrity: fix error reporting in bitmap mode after creation (git-fixes).\n- dm ioctl: fix error return code in target_message (git-fixes).\n- dm mpath: fix racey management of PG initialization (git-fixes).\n- dm mpath: switch paths in dm_blk_ioctl() code path (bsc#1167574, bsc#1175995, bsc#1184485).\n- dm raid: fix discard limits for raid1 (git-fixes).\n- dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails (bsc#1185581).\n- dm writecache: fix the maximum number of arguments (git-fixes).\n- dm writecache: handle DAX to partitions on persistent memory correctly (git-fixes).\n- dm writecache: remove BUG() and fail gracefully instead (git-fixes).\n- dm zoned: select CONFIG_CRC32 (git-fixes).\n- dm: avoid filesystem lookup in dm_get_dev_t() (git-fixes).\n- dm: eliminate potential source of excessive kernel log noise (git-fixes).\n- dm: fix bug with RCU locking in dm_blk_report_zones (git-fixes).\n- dm: remove invalid sparse __acquires and __releases annotations (git-fixes).\n- dmaengine: Fix a double free in dma_async_device_register (git-fixes).\n- dmaengine: dw-edma: Fix crash on loading/unloading driver (git-fixes).\n- dmaengine: dw: Make it dependent to HAS_IOMEM (git-fixes).\n- dmaengine: idxd: Fix clobbering of SWERR overflow bit on writeback (git-fixes).\n- dmaengine: idxd: Fix potential null dereference on pointer status (git-fixes).\n- dmaengine: idxd: cleanup pci interrupt vector allocation management (git-fixes).\n- dmaengine: idxd: clear MSIX permission entry on shutdown (git-fixes).\n- dmaengine: idxd: fix cdev setup and free device lifetime issues (git-fixes).\n- dmaengine: idxd: fix delta_rec and crc size field for completion record (git-fixes).\n- dmaengine: idxd: fix dma device lifetime (git-fixes).\n- dmaengine: idxd: fix opcap sysfs attribute output (git-fixes).\n- dmaengine: idxd: fix wq cleanup of WQCFG registers (git-fixes).\n- dmaengine: idxd: fix wq size store permission state (git-fixes).\n- dmaengine: idxd: removal of pcim managed mmio mapping (git-fixes).\n- docs: kernel-parameters: Add gpio_mockup_named_lines (git-fixes).\n- docs: kernel-parameters: Move gpio-mockup for alphabetic order (git-fixes).\n- dpaa_eth: Remove unnecessary boolean expression in dpaa_get_headroom (git-fixes).\n- dpaa_eth: Use random MAC address when none is given (bsc#1184811).\n- dpaa_eth: copy timestamp fields to new skb in A-050385 workaround (git-fixes).\n- dpaa_eth: fix the RX headroom size alignment (git-fixes).\n- dpaa_eth: update the buffer layout for non-A050385 erratum scenarios (git-fixes).\n- drivers: hv: Fix whitespace errors (bsc#1185725).\n- drivers: net: xgene: Fix the order of the arguments of \u0027alloc_etherdev_mqs()\u0027 (git-fixes).\n- drivers: video: fbcon: fix NULL dereference in fbcon_cursor() (git-fixes).\n- drivers: video: fbcon: fix NULL dereference in fbcon_cursor() (git-fixes).\n- drm/amd/display/dc/dce/dce_aux: Remove duplicate line causing \u0027field overwritten\u0027 issue (git-fixes).\n- drm/amd/display: Check for DSC support instead of ASIC revision (git-fixes).\n- drm/amd/display: Correct algorithm for reversed gamma (git-fixes).\n- drm/amd/display: DCHUB underflow counter increasing in some scenarios (git-fixes).\n- drm/amd/display: Do not optimize bandwidth before disabling planes (git-fixes).\n- drm/amd/display: Fix UBSAN warning for not a valid value for type \u0027_Bool\u0027 (git-fixes).\n- drm/amd/display: Fix UBSAN: shift-out-of-bounds warning (git-fixes).\n- drm/amd/display: Fix debugfs link_settings entry (git-fixes).\n- drm/amd/display: Fix nested FPU context in dcn21_validate_bandwidth() (git-fixes).\n- drm/amd/display: Fix off by one in hdmi_14_process_transaction() (git-fixes).\n- drm/amd/display: Fix two cursor duplication when using overlay (git-fixes).\n- drm/amd/display: Force vsync flip when reconfiguring MPCC (git-fixes).\n- drm/amd/display: Guard against NULL pointer deref when get_i2c_info fails (git-fixes).\n- drm/amd/display: Initialize attribute for hdcp_srm sysfs file (git-fixes).\n- drm/amd/display: Reject non-zero src_y and src_x for video planes (git-fixes).\n- drm/amd/display: Revert dram_clock_change_latency for DCN2.1 (git-fixes).\n- drm/amd/display: Try YCbCr420 color when YCbCr444 fails (git-fixes).\n- drm/amd/display: add handling for hdcp2 rx id list validation (git-fixes).\n- drm/amd/display: changing sr exit latency (git-fixes).\n- drm/amd/display: fix dml prefetch validation (git-fixes).\n- drm/amd/display: fixed divide by zero kernel crash during dsc enablement (git-fixes).\n- drm/amd/display: turn DPMS off on connector unplug (git-fixes).\n- drm/amd/pm: fix workload mismatch on vega10 (git-fixes).\n- drm/amd/powerplay: fix spelling mistake \u0027smu_state_memroy_block\u0027 -\u003e (bsc#1152489) Backporting notes: \t* rename amd/pm to amd/powerplay \t* context changes\n- drm/amdgpu : Fix asic reset regression issue introduce by 8f211fe8ac7c4f (git-fixes).\n- drm/amdgpu/display/dm: add missing parameter documentation (git-fixes).\n- drm/amdgpu/display: buffer INTERRUPT_LOW_IRQ_CONTEXT interrupt work (git-fixes).\n- drm/amdgpu/display: remove redundant continue statement (git-fixes).\n- drm/amdgpu/display: restore AUX_DPHY_TX_CONTROL for DCN2.x (git-fixes).\n- drm/amdgpu/display: use GFP_ATOMIC in dcn21_validate_bandwidth_fp() (git-fixes).\n- drm/amdgpu/swsmu: add interrupt work function (git-fixes).\n- drm/amdgpu/swsmu: add interrupt work handler for smu11 parts (git-fixes).\n- drm/amdgpu: Add additional Sienna Cichlid PCI ID (git-fixes).\n- drm/amdgpu: Add check to prevent IH overflow (git-fixes).\n- drm/amdgpu: Add mem sync flag for IB allocated by SA (git-fixes).\n- drm/amdgpu: Fix GPU TLB update error when PAGE_SIZE \u003e AMDGPU_PAGE_SIZE (git-fixes).\n- drm/amdgpu: Fix some unload driver issues (git-fixes).\n- drm/amdgpu: Init GFX10_ADDR_CONFIG for VCN v3 in DPG mode (git-fixes).\n- drm/amdgpu: check alignment on CPU page for bo map (git-fixes).\n- drm/amdgpu: disable 3DCGCG on picasso/raven1 to avoid compute hang (git-fixes).\n- drm/amdgpu: fb BO should be ttm_bo_type_device (git-fixes).\n- drm/amdgpu: fix NULL pointer dereference (git-fixes).\n- drm/amdgpu: fix concurrent VM flushes on Vega/Navi v2 (git-fixes).\n- drm/amdgpu: fix offset calculation in amdgpu_vm_bo_clear_mappings() (git-fixes).\n- drm/amdgpu: fix parameter error of RREG32_PCIE() in amdgpu_regs_pcie (git-fixes).\n- drm/amdgpu: mask the xgmi number of hops reported from psp to kfd (git-fixes).\n- drm/amdgpu: remove unused variable from struct amdgpu_bo (git-fixes).\n- drm/amdgpu: update gc golden setting for Navi12 (git-fixes).\n- drm/amdgpu: update sdma golden setting for Navi12 (git-fixes).\n- drm/amdkfd: Fix UBSAN shift-out-of-bounds warning (git-fixes).\n- drm/amdkfd: Fix cat debugfs hang_hws file causes system crash bug (git-fixes).\n- drm/amdkfd: Put ACPI table after using it (bsc#1152489) Backporting notes: \t* context changes\n- drm/amdkfd: dqm fence memory corruption (git-fixes).\n- drm/amdkfd: fix build error with AMD_IOMMU_V2=m (git-fixes).\n- drm/ast: AST2500 fixups (bsc#1174416).\n- drm/ast: AST2500 fixups (bsc#1174416).\n- drm/ast: Add 25MHz refclk support (bsc#1174416).\n- drm/ast: Add 25MHz refclk support (bsc#1174416).\n- drm/ast: Add support for 1152x864 mode (bsc#1174416).\n- drm/ast: Add support for 1152x864 mode (bsc#1174416).\n- drm/ast: Add support for AIP200 (bsc#1174416).\n- drm/ast: Add support for AIP200 (bsc#1174416).\n- drm/ast: Correct mode table for AST2500 precatch (bsc#1174416).\n- drm/ast: Correct mode table for AST2500 precatch (bsc#1174416).\n- drm/ast: Disable VGA decoding while driver is active (bsc#1174416).\n- drm/ast: Disable VGA decoding while driver is active (bsc#1174416).\n- drm/ast: Disable screen on register init (bsc#1174416).\n- drm/ast: Disable screen on register init (bsc#1174416).\n- drm/ast: Fix P2A config detection (bsc#1174416).\n- drm/ast: Fix P2A config detection (bsc#1174416).\n- drm/ast: Fix invalid usage of AST_MAX_HWC_WIDTH in cursor atomic_check (git-fixes).\n- drm/ast: Fix register access in non-P2A mode for DP501 (bsc#1174416).\n- drm/ast: Fix register access in non-P2A mode for DP501 (bsc#1174416).\n- drm/ast: Keep MISC fields when enabling VGA (bsc#1174416).\n- drm/ast: Keep MISC fields when enabling VGA (bsc#1174416).\n- drm/ast: drm/ast: Fix boot address for AST2500 (bsc#1174416).\n- drm/ast: drm/ast: Fix boot address for AST2500 (bsc#1174416).\n- drm/compat: Clear bounce structures (git-fixes).\n- drm/dp_mst: Revise broadcast msg lct \u0026 lcr (git-fixes).\n- drm/dp_mst: Set CLEAR_PAYLOAD_ID_TABLE as broadcast (git-fixes).\n- drm/hisilicon: Fix use-after-free (git-fixes).\n- drm/i915/display: fix compiler warning about array overrun (git-fixes).\n- drm/i915/gt: Clear CACHE_MODE prior to clearing residuals (git-fixes).\n- drm/i915/gt: Disable HiZ Raw Stall Optimization on broken gen7 (git-fixes).\n- drm/i915/gvt: Fix error code in intel_gvt_init_device() (git-fixes).\n- drm/i915/gvt: Set SNOOP for PAT3 on BXT/APL to workaround GPU BB hang (git-fixes).\n- drm/i915/overlay: Fix active retire callback alignment (git-fixes).\n- drm/i915/selftests: Fix some error codes (git-fixes).\n- drm/i915: Avoid div-by-zero on gen2 (git-fixes).\n- drm/i915: Fix ICL MG PHY vswing handling (git-fixes).\n- drm/i915: Fix crash in auto_retire (git-fixes).\n- drm/i915: Fix invalid access to ACPI _DSM objects (bsc#1184074).\n- drm/i915: Hold onto an explicit ref to i915_vma_work.pinned (git-fixes).\n- drm/i915: Read C0DRB3/C1DRB3 as 16 bits again (git-fixes).\n- drm/i915: Wedge the GPU if command parser setup fails (git-fixes).\n- drm/imx: imx-ldb: fix out of bounds array access warning (git-fixes).\n- drm/ingenic: Fix non-OSD mode (git-fixes).\n- drm/ingenic: Register devm action to cleanup encoders (git-fixes).\n- drm/komeda: Fix bit check to import to value of proper type (git-fixes).\n- drm/lima: fix reference leak in lima_pm_busy (git-fixes).\n- drm/mcde/panel: Inverse misunderstood flag (git-fixes).\n- drm/mediatek: Fix aal size config (bsc#1152489) Backporting notes: \t* replaced mtk_ddp_write() with writel()\n- drm/msm/a5xx: Remove overwriting A5XX_PC_DBG_ECO_CNTL register (git-fixes).\n- drm/msm/adreno: a5xx_power: Do not apply A540 lm_setup to other GPUs (git-fixes).\n- drm/msm/gem: Add obj-\u003elock wrappers (bsc#1152489) Backporting notes: \t* taken for 9b73bde39cf2 (\u0027drm/msm: Fix use-after-free in msm_gem with carveout\u0027) \t* context changes\n- drm/msm/mdp5: Configure PP_SYNC_HEIGHT to double the vtotal (git-fixes).\n- drm/msm/mdp5: Do not multiply vclk line count by 100 (git-fixes).\n- drm/msm: Fix WARN_ON() splat in _free_object() (bsc#1152489) Backporting notes: \t* context changes\n- drm/msm: Fix a5xx/a6xx timestamps (git-fixes).\n- drm/msm: Fix races managing the OOB state for timestamp vs (bsc#1152489) Backporting notes: \t* context changes\n- drm/msm: Fix suspend/resume on i.MX5 (git-fixes).\n- drm/msm: Fix use-after-free in msm_gem with carveout (bsc#1152489) Backporting notes: \t* context changes\n- drm/msm: Ratelimit invalid-fence message (git-fixes).\n- drm/msm: Set drvdata to NULL when msm_drm_init() fails (git-fixes).\n- drm/msm: fix shutdown hook in case GPU components failed to bind (git-fixes).\n- drm/nouveau/kms/nv50-: Get rid of bogus nouveau_conn_mode_valid() (git-fixes).\n- drm/omap: fix misleading indentation in pixinc() (git-fixes).\n- drm/panfrost: Clear MMU irqs before handling the fault (git-fixes).\n- drm/panfrost: Do not corrupt the queue mutex on open/close (bsc#1152472) Backporting notes: \t* context changes\n- drm/panfrost: Do not try to map pages that are already mapped (git-fixes).\n- drm/panfrost: Fix job timeout handling (bsc#1152472) Backporting notes: \t* context changes\n- drm/panfrost: Remove unused variables in panfrost_job_close() (bsc#1152472)\n- drm/probe-helper: Check epoch counter in output_poll_execute() (git-fixes).\n- drm/qxl: do not run release if qxl failed to init (git-fixes).\n- drm/radeon/dpm: Disable sclk switching on Oland when two 4K 60Hz monitors are connected (git-fixes).\n- drm/radeon: Avoid power table parsing memory leaks (git-fixes).\n- drm/radeon: Fix a missing check bug in radeon_dp_mst_detect() (git-fixes).\n- drm/radeon: Fix off-by-one power_state index heap overwrite (git-fixes).\n- drm/radeon: fix AGP dependency (git-fixes).\n- drm/radeon: fix copy of uninitialized variable back to userspace (git-fixes).\n- drm/shmem-helper: Check for purged buffers in fault handler (git-fixes).\n- drm/shmem-helper: Do not remove the offset in vm_area_struct pgoff (git-fixes).\n- drm/shmem-helpers: vunmap: Do not put pages for dma-buf (git-fixes).\n- drm/sun4i: tcon: fix inverted DCLK polarity (bsc#1152489) Backporting notes: \t* context changes\n- drm/tegra: Fix reference leak when pm_runtime_get_sync() fails (git-fixes).\n- drm/tegra: dc: Do not set PLL clock to 0Hz (git-fixes).\n- drm/tegra: dc: Restore coupling of display controllers (git-fixes).\n- drm/tegra: sor: Grab runtime PM reference across reset (git-fixes).\n- drm/tilcdc: send vblank event when disabling crtc (git-fixes).\n- drm/vc4: crtc: Reduce PV fifo threshold on hvs4 (git-fixes).\n- drm/vc4: hdmi: Restore cec physical address on reconnect (bsc#1152472) Backporting notes: \t* context changes \t* change vc4_hdmi to vc4-\u003ehdmi \t* removed references to encoder-\u003ehdmi_monitor\n- drm/vkms: fix misuse of WARN_ON (git-fixes).\n- drm: Added orientation quirk for OneGX1 Pro (git-fixes).\n- drm: meson_drv add shutdown function (git-fixes).\n- drm: rcar-du: Fix PM reference leak in rcar_cmm_enable() (git-fixes).\n- drm: rcar-du: Fix crash when using LVDS1 clock for CRTC (bsc#1152489) Backporting notes: \t* context changes\n- drm: rcar-du: Fix leak of CMM platform device reference (git-fixes).\n- drm: xlnx: zynqmp: fix a memset in zynqmp_dp_train() (git-fixes).\n- e1000e: Fix duplicate include guard (git-fixes).\n- e1000e: Fix error handling in e1000_set_d0_lplu_state_82571 (git-fixes).\n- e1000e: add rtnl_lock() to e1000_reset_task (git-fixes).\n- efi: use 32-bit alignment for efi_guid_t literals (git-fixes).\n- enetc: Fix reporting of h/w packet counters (git-fixes).\n- enetc: Let the hardware auto-advance the taprio base-time of 0 (git-fixes).\n- enetc: Workaround for MDIO register access issue (git-fixes).\n- epoll: check for events when removing a timed out thread from the wait queue (git-fixes).\n- ethernet/netronome/nfp: Fix a use after free in nfp_bpf_ctrl_msg_rx (git-fixes).\n- ethernet: alx: fix order of calls on resume (git-fixes).\n- ethernet:enic: Fix a use after free bug in enic_hard_start_xmit (git-fixes).\n- ethtool: fix incorrect datatype in set_eee ops (bsc#1176447).\n- ethtool: fix missing NLM_F_MULTI flag when dumping (bsc#1176447).\n- ethtool: pause: make sure we init driver stats (jsc#SLE-15075).\n- exec: Move would_dump into flush_old_exec (git-fixes).\n- ext4: do not try to set xattr into ea_inode if value is empty (bsc#1184730).\n- ext4: find old entry again if failed to rename whiteout (bsc#1184742).\n- ext4: fix potential error in ext4_do_update_inode (bsc#1184731).\n- ext4: fix potential htree index checksum corruption (bsc#1184728).\n- extcon: Add stubs for extcon_register_notifier_all() functions (git-fixes).\n- extcon: Fix error handling in extcon_dev_register (git-fixes).\n- extcon: arizona: Fix some issues when HPDET IRQ fires after the jack has been unplugged (git-fixes).\n- extcon: arizona: Fix various races on driver unbind (git-fixes).\n- fbdev: zero-fill colormap in fbcmap.c (git-fixes).\n- fbmem: add margin check to fb_check_caps() (git-fixes).\n- firmware/efi: Fix a use after bug in efi_mem_reserve_persistent (git-fixes).\n- firmware: arm_scpi: Prevent the ternary sign expansion bug (git-fixes).\n- firmware: qcom-scm: Fix QCOM_SCM configuration (git-fixes).\n- firmware: qcom_scm: Fix kernel-doc function names to match (git-fixes).\n- firmware: qcom_scm: Make __qcom_scm_is_call_available() return bool (git-fixes).\n- firmware: qcom_scm: Reduce locking section for __get_convention() (git-fixes).\n- firmware: qcom_scm: Workaround lack of \u0027is available\u0027 call on SC7180 (git-fixes).\n- flow_dissector: fix byteorder of dissected ICMP ID (bsc#1154353).\n- fnic: use scsi_host_busy_iter() to traverse commands (bsc#1179851).\n- fotg210-udc: Complete OUT requests on short packets (git-fixes).\n- fotg210-udc: Do not DMA more than the buffer can take (git-fixes).\n- fotg210-udc: Fix DMA on EP0 for length \u003e max packet size (git-fixes).\n- fotg210-udc: Fix EP0 IN requests bigger than two packets (git-fixes).\n- fotg210-udc: Mask GRP2 interrupts we do not handle (git-fixes).\n- fotg210-udc: Remove a dubious condition leading to fotg210_done (git-fixes).\n- fs/epoll: restore waking from ep_done_scan() (bsc#1183868).\n- fs/jfs: fix potential integer overflow on shift of a int (bsc#1184741).\n- fs: direct-io: fix missing sdio-\u003eboundary (bsc#1184736).\n- fsl/fman: check dereferencing null pointer (git-fixes).\n- fsl/fman: fix dereference null return value (git-fixes).\n- fsl/fman: fix eth hash table allocation (git-fixes).\n- fsl/fman: fix unreachable code (git-fixes).\n- fsl/fman: reuse set_mac_address() in dtsec init() (bsc#1184811).\n- fsl/fman: tolerate missing MAC address in device tree (bsc#1184811).\n- fsl/fman: use 32-bit unsigned integer (git-fixes).\n- ftrace/x86: Tell objtool to ignore nondeterministic ftrace stack layout (bsc#1177028).\n- ftrace: Fix modify_ftrace_direct (bsc#1177028).\n- ftrace: Handle commands when closing set_ftrace_filter file (git-fixes).\n- fuse: fix bad inode (bsc#1184211).\n- fuse: fix bad inode (bsc#1184211).\n- fuse: fix live lock in fuse_iget() (bsc#1184211).\n- fuse: fix live lock in fuse_iget() (bsc#1184211).\n- fuse: fix write deadlock (bsc#1185573).\n- fuse: verify write return (git-fixes).\n- futex: Change utime parameter to be \u0027const ... *\u0027 (git-fixes).\n- futex: Do not apply time namespace adjustment on FUTEX_LOCK_PI (bsc#1164648).\n- futex: Get rid of the val2 conditional dance (git-fixes).\n- futex: Make syscall entry points less convoluted (git-fixes).\n- gcc-plugins: drop support for GCC \u0026lt;= 4.7 (bcs#1181862).\n- gcc-plugins: make it possible to disable CONFIG_GCC_PLUGINS again (bcs#1181862).\n- gcc-plugins: simplify GCC plugin-dev capability test (bsc#1181862).\n- geneve: do not modify the shared tunnel info when PMTU triggers an ICMP reply (bsc#1176447).\n- geneve: do not modify the shared tunnel info when PMTU triggers an ICMP reply (git-fixes).\n- genirq/irqdomain: Do not try to free an interrupt that has no (git-fixes)\n- genirq: Disable interrupts for force threaded handlers (git-fixes)\n- genirq: Reduce irqdebug cacheline bouncing (bsc#1185703 ltc#192641).\n- gianfar: Account for Tx PTP timestamp in the skb headroom (git-fixes).\n- gianfar: Fix TX timestamping with a stacked DSA driver (git-fixes).\n- gianfar: Handle error code at MAC address change (git-fixes).\n- gianfar: Replace skb_realloc_headroom with skb_cow_head for PTP (git-fixes).\n- gpio: omap: Save and restore sysconfig (git-fixes).\n- gpio: pca953x: Set IRQ type when handle Intel Galileo Gen 2 (git-fixes).\n- gpio: sysfs: Obey valid_mask (git-fixes).\n- gpio: xilinx: Correct kernel doc for xgpio_probe() (git-fixes).\n- gpio: zynq: fix reference leak in zynq_gpio functions (git-fixes).\n- gpiolib: Do not free if pin ranges are not defined (git-fixes).\n- gpiolib: acpi: Add missing IRQF_ONESHOT (git-fixes).\n- gpiolib: acpi: Add quirk to ignore EC wakeups on Dell Venue 10 Pro 5055 (git-fixes).\n- gpu/xen: Fix a use after free in xen_drm_drv_init (git-fixes).\n- hrtimer: Update softirq_expires_next correctly after (git-fixes)\n- hv_netvsc: Reset the RSC count if NVSP_STAT_FAIL in netvsc_receive() (git-fixes).\n- hwmon: (ina3221) Fix PM usage counter unbalance in ina3221_write_enable (git-fixes).\n- hwmon: (occ) Fix poll rate limiting (git-fixes).\n- i2c: Add I2C_AQ_NO_REP_START adapter quirk (git-fixes).\n- i2c: bail out early when RDWR parameters are wrong (git-fixes).\n- i2c: cadence: add IRQ check (git-fixes).\n- i2c: emev2: add IRQ check (git-fixes).\n- i2c: img-scb: fix reference leak when pm_runtime_get_sync fails (git-fixes).\n- i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails (git-fixes).\n- i2c: jz4780: add IRQ check (git-fixes).\n- i2c: mlxbf: add IRQ check (git-fixes).\n- i2c: omap: fix reference leak when pm_runtime_get_sync fails (git-fixes).\n- i2c: rcar: faster irq code to minimize HW race condition (git-fixes).\n- i2c: rcar: optimize cacheline to minimize HW race condition (git-fixes).\n- i2c: sh7760: add IRQ check (git-fixes).\n- i2c: sh7760: fix IRQ error path (git-fixes).\n- i2c: sprd: fix reference leak when pm_runtime_get_sync fails (git-fixes).\n- i2c: tegra: Add missing pm_runtime_put() (bsc#1184386).\n- i2c: tegra: Check errors for both positive and negative values (bsc#1184386).\n- i2c: tegra: Clean up and improve comments (bsc#1184386).\n- i2c: tegra: Clean up printk messages (bsc#1184386).\n- i2c: tegra: Clean up probe function (bsc#1184386).\n- i2c: tegra: Clean up variable names (bsc#1184386).\n- i2c: tegra: Clean up variable types (bsc#1184386).\n- i2c: tegra: Clean up whitespaces, newlines and indentation (bsc#1184386).\n- i2c: tegra: Create i2c_writesl_vi() to use with VI I2C for filling TX FIFO (bsc#1184386).\n- i2c: tegra: Factor out error recovery from tegra_i2c_xfer_msg() (bsc#1184386).\n- i2c: tegra: Factor out hardware initialization into separate function (bsc#1184386).\n- i2c: tegra: Factor out packet header setup from tegra_i2c_xfer_msg() (bsc#1184386).\n- i2c: tegra: Factor out register polling into separate function (bsc#1184386).\n- i2c: tegra: Handle potential error of tegra_i2c_flush_fifos() (bsc#1184386).\n- i2c: tegra: Improve driver module description (bsc#1184386).\n- i2c: tegra: Improve formatting of variables (bsc#1184386).\n- i2c: tegra: Initialize div-clk rate unconditionally (bsc#1184386).\n- i2c: tegra: Make tegra_i2c_flush_fifos() usable in atomic transfer (bsc#1184386).\n- i2c: tegra: Mask interrupt in tegra_i2c_issue_bus_clear() (bsc#1184386).\n- i2c: tegra: Move out all device-tree parsing into tegra_i2c_parse_dt() (bsc#1184386).\n- i2c: tegra: Remove \u0027dma\u0027 variable from tegra_i2c_xfer_msg() (bsc#1184386).\n- i2c: tegra: Remove error message used for devm_request_irq() failure (bsc#1184386).\n- i2c: tegra: Remove i2c_dev.clk_divisor_non_hs_mode member (bsc#1184386).\n- i2c: tegra: Remove likely/unlikely from the code (bsc#1184386).\n- i2c: tegra: Remove outdated barrier() (bsc#1184386).\n- i2c: tegra: Remove redundant check in tegra_i2c_issue_bus_clear() (bsc#1184386).\n- i2c: tegra: Rename wait/poll functions (bsc#1184386).\n- i2c: tegra: Reorder location of functions in the code (bsc#1184386).\n- i2c: tegra: Runtime PM always available on Tegra (bsc#1184386).\n- i2c: tegra: Use clk-bulk helpers (bsc#1184386).\n- i2c: tegra: Use devm_platform_get_and_ioremap_resource() (bsc#1184386).\n- i2c: tegra: Use platform_get_irq() (bsc#1184386).\n- i2c: tegra: Use reset_control_reset() (bsc#1184386).\n- i2c: tegra: Use threaded interrupt (bsc#1184386).\n- i2c: tegra: Wait for config load atomically while in ISR (bsc#1184386).\n- i40e: Add zero-initialization of AQ command structures (git-fixes).\n- i40e: Added Asym_Pause to supported link modes (git-fixes).\n- i40e: Fix PHY type identifiers for 2.5G and 5G adapters (git-fixes).\n- i40e: Fix add TC filter for IPv6 (git-fixes).\n- i40e: Fix addition of RX filters after enabling FW LLDP agent (git-fixes).\n- i40e: Fix display statistics for veb_tc (git-fixes).\n- i40e: Fix endianness conversions (git-fixes).\n- i40e: Fix flow for IPv6 next header (extension header) (git-fixes).\n- i40e: Fix kernel oops when i40e driver removes VF\u0027s (git-fixes).\n- i40e: Fix overwriting flow control settings during driver loading (git-fixes).\n- i40e: Fix parameters in aq_get_phy_register() (jsc#SLE-8025).\n- i40e: Fix sparse error: \u0027vsi-\u003enetdev\u0027 could be null (jsc#SLE-8025).\n- i40e: Fix sparse error: uninitialized symbol \u0027ring\u0027 (jsc#SLE-13701).\n- i40e: Fix sparse errors in i40e_txrx.c (git-fixes).\n- i40e: Fix sparse errors in i40e_txrx.c (git-fixes).\n- i40e: Fix sparse warning: missing error code \u0027err\u0027 (git-fixes).\n- i40e: Fix use-after-free in i40e_client_subtask() (git-fixes).\n- i40e: fix broken XDP support (git-fixes).\n- i40e: fix the panic when running bpf in xdpdrv mode (git-fixes).\n- i40e: fix the restart auto-negotiation after FEC modified (git-fixes).\n- i915/perf: Start hrtimer only if sampling the OA buffer (git-fixes).\n- iavf: Fix incorrect adapter get in iavf_resume (git-fixes).\n- iavf: use generic power management (git-fixes).\n- ibmvfc: Avoid move login if fast fail is enabled (bsc#1185938 ltc#192043).\n- ibmvfc: Handle move login failure (bsc#1185938 ltc#192043).\n- ibmvfc: Reinit target retries (bsc#1185938 ltc#192043).\n- ibmvnic: add comments for spinlock_t definitions (bsc#1183871 ltc#192139).\n- ibmvnic: avoid calling napi_disable() twice (bsc#1065729).\n- ibmvnic: avoid multiple line dereference (bsc#1183871 ltc#192139).\n- ibmvnic: clean up the remaining debugfs data structures (bsc#1065729).\n- ibmvnic: correctly use dev_consume/free_skb_irq (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290 git-fixes).\n- ibmvnic: fix block comments (bsc#1183871 ltc#192139).\n- ibmvnic: fix braces (bsc#1183871 ltc#192139).\n- ibmvnic: fix miscellaneous checks (bsc#1183871 ltc#192139).\n- ibmvnic: improve failover sysfs entry (bsc#1043990 ltc#155681 git-fixes).\n- ibmvnic: merge do_change_param_reset into do_reset (bsc#1183871 ltc#192139).\n- ibmvnic: prefer \u0027unsigned long\u0027 over \u0027unsigned long int\u0027 (bsc#1183871 ltc#192139).\n- ibmvnic: prefer strscpy over strlcpy (bsc#1183871 ltc#192139).\n- ibmvnic: print adapter state as a string (bsc#1152457 ltc#174432 git-fixes).\n- ibmvnic: print reset reason as a string (bsc#1152457 ltc#174432 git-fixes).\n- ibmvnic: queue reset work in system_long_wq (bsc#1152457 ltc#174432 git-fixes).\n- ibmvnic: remove default label from to_string switch (bsc#1152457 ltc#174432 git-fixes).\n- ibmvnic: remove duplicate napi_schedule call in do_reset function (bsc#1065729).\n- ibmvnic: remove duplicate napi_schedule call in open function (bsc#1065729).\n- ibmvnic: remove unnecessary rmb() inside ibmvnic_poll (bsc#1183871 ltc#192139).\n- ibmvnic: remove unused spinlock_t stats_lock definition (bsc#1183871 ltc#192139).\n- ibmvnic: rework to ensure SCRQ entry reads are properly ordered (bsc#1183871 ltc#192139).\n- ice: Account for port VLAN in VF max packet size calculation (git-fixes).\n- ice: Account for port VLAN in VF max packet size calculation (git-fixes).\n- ice: Cleanup fltr list in case of allocation issues (git-fixes).\n- ice: Continue probe on link/PHY errors (jsc#SLE-12878).\n- ice: Fix for dereference of NULL pointer (git-fixes).\n- ice: Increase control queue timeout (git-fixes).\n- ice: Use port number instead of PF ID for WoL (jsc#SLE-12878).\n- ice: fix memory allocation call (jsc#SLE-12878).\n- ice: fix memory leak if register_netdev_fails (git-fixes).\n- ice: fix memory leak in ice_vsi_setup (git-fixes).\n- ice: fix memory leak of aRFS after resuming from suspend (jsc#SLE-12878).\n- ice: prevent ice_open and ice_stop during reset (git-fixes).\n- ice: remove DCBNL_DEVRESET bit from PF state (jsc#SLE-7926).\n- ics932s401: fix broken handling of errors when word reading fails (git-fixes).\n- igb: Fix duplicate include guard (git-fixes).\n- igb: XDP extack message on error (jsc#SLE-13536).\n- igb: XDP xmit back fix error code (jsc#SLE-13536).\n- igb: avoid premature Rx buffer reuse (jsc#SLE-13536).\n- igb: avoid transmit queue timeout in xdp path (jsc#SLE-13536).\n- igb: check timestamp validity (git-fixes).\n- igb: skb add metasize for xdp (jsc#SLE-13536).\n- igb: take VLAN double header into account (jsc#SLE-13536).\n- igb: use xdp_do_flush (jsc#SLE-13536).\n- igc: Fix Pause Frame Advertising (git-fixes).\n- igc: Fix Supported Pause Frame Link Setting (git-fixes).\n- igc: Fix igc_ptp_rx_pktstamp() (bsc#1160634).\n- igc: Fix igc_ptp_rx_pktstamp() (bsc#1160634).\n- igc: reinit_locked() should be called with rtnl_lock (git-fixes).\n- igc: reinit_locked() should be called with rtnl_lock (git-fixes).\n- iio: adc: ad7949: fix wrong ADC result due to incorrect bit mask (git-fixes).\n- iio: adis16400: Fix an error code in adis16400_initial_setup() (git-fixes).\n- iio: gyro: mpu3050: Fix error handling in mpu3050_trigger_handler (git-fixes).\n- iio: gyro: mpu3050: Fix reported temperature value (git-fixes).\n- iio: hid-sensor-humidity: Fix alignment issue of timestamp channel (git-fixes).\n- iio: hid-sensor-prox: Fix scale not correct issue (git-fixes).\n- iio: hid-sensor-temperature: Fix issues of timestamp channel (git-fixes).\n- iio: proximity: pulsedlight: Fix rumtime PM imbalance on error (git-fixes).\n- iio: tsl2583: Fix division by a zero lux_val (git-fixes).\n- iio:accel:adis16201: Fix wrong axis assignment that prevents loading (git-fixes).\n- iio:adc:qcom-spmi-vadc: add default scale to LR_MUX2_BAT_ID channel (git-fixes).\n- ima: Free IMA measurement buffer after kexec syscall (git-fixes).\n- include/linux/sched/mm.h: use rcu_dereference in in_vfork() (git-fixes).\n- intel_th: Consistency and off-by-one fix (git-fixes).\n- intel_th: pci: Add Alder Lake-M support (git-fixes).\n- intel_th: pci: Add Rocket Lake CPU support (git-fixes).\n- interconnect: core: fix error return code of icc_link_destroy() (git-fixes).\n- iommu/amd: Add support for map/unmap_resource (jsc#ECO-3482).\n- iommu/amd: Fix sleeping in atomic in increase_address_space() (bsc#1183277).\n- iommu/amd: Fix sleeping in atomic in increase_address_space() (bsc#1183310).\n- iommu/intel: Fix memleak in intel_irq_remapping_alloc (bsc#1183278).\n- iommu/intel: Fix memleak in intel_irq_remapping_alloc (bsc#1183312).\n- iommu/qcom: add missing put_device() call in qcom_iommu_of_xlate() (bsc#1183313).\n- iommu/qcom: add missing put_device() call in qcom_iommu_of_xlate() (bsc#1183637).\n- iommu/vt-d: Add get_domain_info() helper (bsc#1183279).\n- iommu/vt-d: Avoid panic if iommu init fails in tboot system (bsc#1183280).\n- iommu/vt-d: Avoid panic if iommu init fails in tboot system (bsc#1183315).\n- iommu/vt-d: Correctly check addr alignment in qi_flush_dev_iotlb_pasid() (bsc#1183281).\n- iommu/vt-d: Correctly check addr alignment in qi_flush_dev_iotlb_pasid() (bsc#1183316).\n- iommu/vt-d: Do not use flush-queue when caching-mode is on (bsc#1183282).\n- iommu/vt-d: Do not use flush-queue when caching-mode is on (bsc#1183317).\n- iommu/vt-d: Fix general protection fault in aux_detach_device() (bsc#1183283).\n- iommu/vt-d: Fix general protection fault in aux_detach_device() (bsc#1183318).\n- iommu/vt-d: Fix ineffective devTLB invalidation for subdevices (bsc#1183284).\n- iommu/vt-d: Fix ineffective devTLB invalidation for subdevices (bsc#1183319).\n- iommu/vt-d: Fix status code for Allocate/Free PASID command (bsc#1183320).\n- iommu/vt-d: Fix unaligned addresses for intel_flush_svm_range_dev() (bsc#1183285).\n- iommu/vt-d: Fix unaligned addresses for intel_flush_svm_range_dev() (bsc#1183321).\n- iommu/vt-d: Move intel_iommu info from struct intel_svm to struct intel_svm_dev (bsc#1183286).\n- iommu/vt-d: Move intel_iommu info from struct intel_svm to struct intel_svm_dev (bsc#1183322).\n- iommu/vt-d: Use device numa domain if RHSA is missing (bsc#1184585).\n- iommu: Check dev-\u003eiommu in dev_iommu_priv_get() before dereferencing it (bsc#1183311).\n- iommu: Switch gather-\u003eend to the inclusive end (bsc#1183314).\n- ionic: linearize tso skb with too many frags (bsc#1167773).\n- ionic: linearize tso skb with too many frags (bsc#1167773).\n- iopoll: introduce read_poll_timeout macro (git-fixes).\n- ipc/mqueue, msg, sem: Avoid relying on a stack reference past its expiry (bsc#1185988).\n- ipmi/watchdog: Stop watchdog timer when the current action is \u0027none\u0027 (bsc#1184855).\n- ipw2x00: potential buffer overflow in libipw_wx_set_encodeext() (git-fixes).\n- irqchip/ls-extirq: Add LS1043A, LS1088A external interrupt support (bsc#1184264).\n- irqchip/ls-extirq: Add LS1043A, LS1088A external interrupt support (bsc#1185233).\n- irqchip/ls-extirq: add IRQCHIP_SKIP_SET_WAKE to the irqchip flags (bsc#1184264).\n- irqchip/ls-extirq: add IRQCHIP_SKIP_SET_WAKE to the irqchip flags (bsc#1185233).\n- irqchip: Add support for Layerscape external interrupt lines (bsc#1185233).\n- isofs: release buffer head before return (bsc#1182613).\n- iwlwifi: add support for Qu with AX201 device (git-fixes).\n- iwlwifi: pcie: make cfg vs. trans_cfg more robust (git-fixes).\n- ixgbe: fail to create xfrm offload of IPsec tunnel mode SA (git-fixes).\n- ixgbe: fix unbalanced device enable/disable in suspend/resume (jsc#SLE-13706).\n- jffs2: fix use after free in jffs2_sum_write_data() (bsc#1184740).\n- kABI: Fix kABI caused by fixes for bsc#1174426 (bsc#1174426).\n- kABI: cover up change in struct kvm_arch (bsc#1184969).\n- kABI: powerpc/pmem: Include pmem prototypes (bsc#1113295 git-fixes).\n- kABI: powerpc/pseries: Add shutdown() to vio_driver and vio_bus (bsc#1184209 ltc#190917).\n- kbuild: Fail if gold linker is detected (bcs#1181862).\n- kbuild: add dummy toolchains to enable all cc-option etc. in Kconfig (bcs#1181862).\n- kbuild: change *FLAGS_\u0026lt;basetarget\u003e.o to take the path relative to $(obj) (bcs#1181862).\n- kbuild: dummy-tools, fix inverted tests for gcc (bcs#1181862).\n- kbuild: dummy-tools, support MPROFILE_KERNEL checks for ppc (bsc#1181862).\n- kbuild: improve cc-option to clean up all temporary files (bsc#1178330).\n- kbuild: include scripts/Makefile.* only when relevant CONFIG is enabled (bcs#1181862).\n- kbuild: simplify GCC_PLUGINS enablement in dummy-tools/gcc (bcs#1181862).\n- kbuild: stop filtering out $(GCC_PLUGINS_CFLAGS) from cc-option base (bcs#1181862).\n- kbuild: use -S instead of -E for precise cc-option test in Kconfig (bsc#1178330).\n- kconfig: introduce m32-flag and m64-flag (bcs#1181862).\n- kernel-docs.spec.in: Build using an utf-8 locale. Sphinx cannot handle UTF-8 input in non-UTF-8 locale.\n- kernel/smp: make csdlock timeout depend on boot parameter (bsc#1180846).\n- kvm: svm: Update svm_xsaves_supported (jsc#SLE-13573).\n- kvm: x86: Enumerate support for CLZERO instruction (jsc#SLE-13573).\n- leds: lp5523: check return value of lp5xx_read and jump to cleanup code (git-fixes).\n- lib/syscall: fix syscall registers retrieval on 32-bit platforms (git-fixes).\n- libbpf: Add explicit padding to bpf_xdp_set_link_opts (bsc#1177028).\n- libbpf: Add explicit padding to btf_dump_emit_type_decl_opts (bsc#1177028).\n- libbpf: Clear map_info before each bpf_obj_get_info_by_fd (bsc#1155518).\n- libbpf: Fix BTF dump of pointer-to-array-of-struct (bsc#1155518).\n- libbpf: Fix INSTALL flag order (bsc#1155518).\n- libbpf: Fix bail out from \u0027ringbuf_process_ring()\u0027 on error (bsc#1177028).\n- libbpf: Fix error path in bpf_object__elf_init() (bsc#1177028).\n- libbpf: Fix signed overflow in ringbuf_process_ring (bsc#1177028).\n- libbpf: Initialize the bpf_seq_printf parameters array field by field (bsc#1177028).\n- libbpf: Only create rx and tx XDP rings when necessary (bsc#1155518).\n- libbpf: Use SOCK_CLOEXEC when opening the netlink socket (bsc#1155518).\n- libnvdimm/label: Return -ENXIO for no slot in __blk_label_update (bsc#1185269).\n- libnvdimm/namespace: Fix reaping of invalidated block-window-namespace labels (bsc#1185269).\n- libnvdimm/region: Fix nvdimm_has_flush() to handle ND_REGION_ASYNC (bsc#1184969 git-fixes).\n- libnvdimm/security: ensure sysfs poll thread woke up and fetch updated attr (git-fixes).\n- liquidio: Fix unintented sign extension of a left shift of a u16 (git-fixes).\n- locking/mutex: Fix non debug version of mutex_lock_io_nested() (git-fixes).\n- locking/qrwlock: Fix ordering in queued_write_lock_slowpath() (bsc#1185041).\n- lpfc: Decouple port_template and vport_template (bsc#185032).\n- mISDN: fix crash in fritzpci (git-fixes).\n- mac80211: Allow HE operation to be longer than expected (git-fixes).\n- mac80211: bail out if cipher schemes are invalid (git-fixes).\n- mac80211: choose first enabled channel for monitor (git-fixes).\n- mac80211: clear sta-\u003efast_rx when STA removed from 4-addr VLAN (git-fixes).\n- mac80211: clear the beacon\u0027s CRC after channel switch (git-fixes).\n- mac80211: fix TXQ AC confusion (git-fixes).\n- mac80211: fix double free in ibss_leave (git-fixes).\n- mac80211: fix rate mask reset (git-fixes).\n- macvlan: macvlan_count_rx() needs to be aware of preemption (git-fixes).\n- md-cluster: fix use-after-free issue when removing rdev (bsc#1184082).\n- md/raid1: properly indicate failure when ending a failed write request (bsc#1185680).\n- md: do not flush workqueue unconditionally in md_open (bsc#1184081).\n- md: factor out a mddev_find_locked helper from mddev_find (bsc#1184081).\n- md: md_open returns -EBUSY when entering racing area (bsc#1184081).\n- md: split mddev_find (bsc#1184081).\n- mdio: fix mdio-thunder.c dependency \u0026 build error (git-fixes).\n- media: adv7604: fix possible use-after-free in adv76xx_remove() (git-fixes).\n- media: cros-ec-cec: do not bail on device_init_wakeup failure (git-fixes).\n- media: cx23885: add more quirks for reset DMA on some AMD IOMMU (git-fixes).\n- media: drivers: media: pci: sta2x11: fix Kconfig dependency on GPIOLIB (git-fixes).\n- media: dvb-usb: fix memory leak in dvb_usb_adapter_init (git-fixes).\n- media: dvbdev: Fix memory leak in dvb_media_device_free() (git-fixes).\n- media: em28xx: fix memory leak (git-fixes).\n- media: gspca/sq905.c: fix uninitialized variable (git-fixes).\n- media: i2c: adv7511-v4l2: fix possible use-after-free in adv7511_remove() (git-fixes).\n- media: i2c: adv7842: fix possible use-after-free in adv7842_remove() (git-fixes).\n- media: i2c: tda1997: Fix possible use-after-free in tda1997x_remove() (git-fixes).\n- media: imx: capture: Return -EPIPE from __capture_legacy_try_fmt() (git-fixes).\n- media: ite-cir: check for receive overflow (git-fixes).\n- media: m88rs6000t: avoid potential out-of-bounds reads on arrays (git-fixes).\n- media: mantis: remove orphan mantis_core.c (git-fixes).\n- media: mceusb: sanity check for prescaler value (git-fixes).\n- media: media/saa7164: fix saa7164_encoder_register() memory leak bugs (git-fixes).\n- media: omap4iss: return error code when omap4iss_get() failed (git-fixes).\n- media: platform: sti: Fix runtime PM imbalance in regs_show (git-fixes).\n- media: platform: sunxi: sun6i-csi: fix error return code of sun6i_video_start_streaming() (git-fixes).\n- media: rc: compile rc-cec.c into rc-core (git-fixes).\n- media: saa7134: use sg_dma_len when building pgtable (git-fixes).\n- media: saa7146: use sg_dma_len when building pgtable (git-fixes).\n- media: staging/intel-ipu3: Fix memory leak in imu_fmt (git-fixes).\n- media: staging/intel-ipu3: Fix race condition during set_fmt (git-fixes).\n- media: staging/intel-ipu3: Fix set_fmt error handling (git-fixes).\n- media: tc358743: fix possible use-after-free in tc358743_remove() (git-fixes).\n- media: usbtv: Fix deadlock on suspend (git-fixes).\n- media: uvcvideo: Allow entities with no pads (git-fixes).\n- media: v4l2-ctrls.c: fix race condition in hdl-\u003erequests list (git-fixes).\n- media: v4l2-ctrls.c: fix shift-out-of-bounds in std_validate (git-fixes).\n- media: v4l: vsp1: Fix bru null pointer access (git-fixes).\n- media: v4l: vsp1: Fix uif null pointer access (git-fixes).\n- media: vicodec: add missing v4l2_ctrl_request_hdl_put() (git-fixes).\n- memory: gpmc: fix out of bounds read and dereference on gpmc_cs[] (git-fixes).\n- memory: mtk-smi: Fix PM usage counter unbalance in mtk_smi ops (bsc#1183325).\n- memory: pl353: fix mask of ECC page_size config register (git-fixes).\n- mfd: arizona: Fix rumtime PM imbalance on error (git-fixes).\n- mfd: intel_pmt: Fix nuisance messages and handling of disabled capabilities (git-fixes).\n- mfd: lpc_sch: Partially revert \u0027Add support for Intel Quark X1000\u0027 (git-fixes).\n- mfd: stm32-timers: Avoid clearing auto reload register (git-fixes).\n- misc/pvpanic: Export module FDT device table (git-fixes).\n- misc: eeprom_93xx46: Add quirk to support Microchip 93LC46B eeprom (git-fixes).\n- misc: fastrpc: restrict user apps from sending kernel RPC messages (git-fixes).\n- misc: lis3lv02d: Fix false-positive WARN on various HP models (git-fixes).\n- misc: vmw_vmci: explicitly initialize vmci_datagram payload (git-fixes).\n- misc: vmw_vmci: explicitly initialize vmci_notify_bm_set_msg struct (git-fixes).\n- mlxsw: spectrum_mr: Update egress RIF list before route\u0027s action (git-fixes).\n- mm, numa: fix bad pmd by atomically check for pmd_trans_huge when marking page tables prot_numa (bsc#1168777).\n- mm/rmap: fix potential pte_unmap on an not mapped pte (git-fixes).\n- mm: hugetlbfs: fix cannot migrate the fallocated HugeTLB page (git-fixes).\n- mm: memcontrol: fix cpuhotplug statistics flushing (bsc#1185606).\n- mmc: block: Update ext_csd.cache_ctrl if it was written (git-fixes).\n- mmc: core: Correct descriptions in mmc_of_parse() (git-fixes).\n- mmc: core: Do a power cycle when the CMD11 fails (git-fixes).\n- mmc: core: Fix partition switch time for eMMC (git-fixes).\n- mmc: core: Set read only for SD cards with permanent write protect bit (git-fixes).\n- mmc: cqhci: Add cqhci_deactivate() (git-fixes).\n- mmc: cqhci: Fix random crash when remove mmc module/card (git-fixes).\n- mmc: mmc_spi: Drop unused NO_IRQ definition (git-fixes).\n- mmc: mxs-mmc: Fix a resource leak in an error handling path in \u0027mxs_mmc_probe()\u0027 (git-fixes).\n- mmc: sdhci-iproc: Cap min clock frequency on BCM2711 (bsc#1186009)\n- mmc: sdhci-iproc: Set SDHCI_QUIRK_CAP_CLOCK_BASE_BROKEN on BCM2711 (bsc#1186009)\n- mmc: sdhci-of-arasan: Add missed checks for devm_clk_register() (git-fixes).\n- mmc: sdhci-of-dwcmshc: fix rpmb access (git-fixes).\n- mmc: sdhci-of-dwcmshc: implement specific set_uhs_signaling (git-fixes).\n- mmc: sdhci-of-dwcmshc: set SDHCI_QUIRK2_PRESET_VALUE_BROKEN (git-fixes).\n- mmc: sdhci-of-esdhc: make sure delay chain locked for HS400 (git-fixes).\n- mmc: sdhci-of-esdhc: set timeout to max before tuning (git-fixes).\n- mmc: sdhci-pci-gli: increase 1.8V regulator wait (git-fixes).\n- mmc: sdhci-pci: Add PCI IDs for Intel LKF (git-fixes).\n- mmc: sdhci-pci: Fix SDHCI_RESET_ALL for CQHCI for Intel GLK-based controllers (git-fixes).\n- mmc: sdhci-pci: Fix initialization of some SD cards for Intel BYT-based controllers (git-fixes).\n- mmc: sdhci: Check for reset prior to DMA address unmap (git-fixes).\n- mmc: sdhci: Use Auto CMD Auto Select only when v4_mode is true (git-fixes).\n- mmc: uniphier-sd: Fix a resource leak in the remove function (git-fixes).\n- mmc: uniphier-sd: Fix an error handling path in uniphier_sd_probe() (git-fixes).\n- mount: fix mounting of detached mounts onto targets that reside on shared mounts (git-fixes).\n- mt7601u: fix always true expression (git-fixes).\n- mt76: dma: do not report truncated frames to mac80211 (git-fixes).\n- mt76: mt7615: fix entering driver-own state on mt7663 (git-fixes).\n- mt76: mt7615: support loading EEPROM for MT7613BE (git-fixes).\n- mt76: mt76x0: disable GTK offloading (git-fixes).\n- mt76: mt7915: fix aggr len debugfs node (git-fixes).\n- mt76: mt7915: fix txpower init for TSSI off chips (git-fixes).\n- mtd: Handle possible -EPROBE_DEFER from parse_mtd_partitions() (git-fixes).\n- mtd: rawnand: atmel: Update ecc_stats.corrected counter (git-fixes).\n- mtd: rawnand: brcmnand: fix OOB R/W with Hamming ECC (git-fixes).\n- mtd: rawnand: fsmc: Fix error code in fsmc_nand_probe() (git-fixes).\n- mtd: rawnand: gpmi: Fix a double free in gpmi_nand_init (git-fixes).\n- mtd: rawnand: qcom: Return actual error code instead of -ENODEV (git-fixes).\n- mtd: require write permissions for locking and badblock ioctls (git-fixes).\n- mtd: spi-nor: Rename \u0027n25q512a\u0027 to \u0027mt25qu512a (n25q512a)\u0027 (bsc#1167260).\n- mtd: spi-nor: Split mt25qu512a (n25q512a) entry into two (bsc#1167260).\n- mtd: spinand: core: add missing MODULE_DEVICE_TABLE() (git-fixes).\n- mwifiex: pcie: skip cancel_work_sync() on reset failure path (git-fixes).\n- nbd: fix a block_device refcount leak in nbd_release (git-fixes).\n- net, xdp: Update pkt_type if generic XDP changes unicast MAC (git-fixes).\n- net/mlx4_core: Add missed mlx4_free_cmd_mailbox() (git-fixes).\n- net/mlx4_en: update moderation when config reset (git-fixes).\n- net/mlx5: Add back multicast stats for uplink representor (jsc#SLE-15172).\n- net/mlx5: Delete extra dump stack that gives nothing (git-fixes).\n- net/mlx5: Do not request more than supported EQs (git-fixes).\n- net/mlx5: Fix PPLM register mapping (jsc#SLE-8464).\n- net/mlx5: Fix bit-wise and with zero (jsc#SLE-15172).\n- net/mlx5: Fix health error state handling (bsc#1186467).\n- net/mlx5e: Allow to match on MPLS parameters only for MPLS over UDP (jsc#SLE-15172).\n- net/mlx5e: Do not match on Geneve options in case option masks are all zero (git-fixes).\n- net/mlx5e: E-switch, Fix rate calculation division (jsc#SLE-8464).\n- net/mlx5e: Fix error path for ethtool set-priv-flag (git-fixes).\n- net/mlx5e: Fix ethtool indication of connector type (git-fixes).\n- net/mlx5e: Fix setting of RS FEC mode (jsc#SLE-15172).\n- net/mlx5e: Offload tuple rewrite for non-CT flows (jsc#SLE-15172).\n- net/mlx5e: RX, Mind the MPWQE gaps when calculating offsets (jsc#SLE-15172).\n- net/mlx5e: fix ingress_ifindex check in mlx5e_flower_parse_meta (jsc#SLE-8464).\n- net/qlcnic: Fix a use after free in qlcnic_83xx_get_minidump_template (git-fixes).\n- net/sched: act_ct: fix wild memory access when clearing fragments (bsc#1176447).\n- net: arc_emac: Fix memleak in arc_mdio_probe (git-fixes).\n- net: atheros: switch from \u0027pci_\u0027 to \u0027dma_\u0027 API (git-fixes).\n- net: atlantic: fix out of range usage of active_vlans array (git-fixes).\n- net: atlantic: fix potential error handling (git-fixes).\n- net: atlantic: fix use after free kasan warn (git-fixes).\n- net: b44: fix error return code in b44_init_one() (git-fixes).\n- net: bonding: fix error return code of bond_neigh_init() (bsc#1154353).\n- net: cdc-phonet: fix data-interface release on probe failure (git-fixes).\n- net: cls_api: Fix uninitialised struct field bo-\u003eunlocked_driver_cb (bsc#1176447).\n- net: dsa: felix: implement port flushing on .phylink_mac_link_down (git-fixes).\n- net: dsa: rtl8366: Fix VLAN semantics (git-fixes).\n- net: dsa: rtl8366: Fix VLAN set-up (git-fixes).\n- net: dsa: rtl8366rb: Support all 4096 VLANs (git-fixes).\n- net: enetc: allow hardware timestamping on TX queues with tc-etf enabled (git-fixes).\n- net: enetc: do not disable VLAN filtering in IFF_PROMISC mode (git-fixes).\n- net: enetc: fix link error again (git-fixes).\n- net: enetc: remove bogus write to SIRXIDR from enetc_setup_rxbdr (git-fixes).\n- net: enetc: take the MDIO lock only once per NAPI poll cycle (git-fixes).\n- net: enic: Cure the enic api locking trainwreck (git-fixes).\n- net: ethernet: aquantia: Fix wrong return value (git-fixes).\n- net: ethernet: cavium: octeon_mgmt: use phy_start and phy_stop (git-fixes).\n- net: ethernet: ibm: ibmvnic: Fix some kernel-doc misdemeanours (bsc#1183871 ltc#192139).\n- net: ethernet: ti: cpsw: fix clean up of vlan mc entries for host port (git-fixes).\n- net: ethernet: ti: cpsw: fix error return code in cpsw_probe() (git-fixes).\n- net: fec: Fix PHY init after phy_reset_after_clk_enable() (git-fixes).\n- net: fec: Fix phy_device lookup for phy_reset_after_clk_enable() (git-fixes).\n- net: fec: Fix reference count leak in fec series ops (git-fixes).\n- net: gemini: Fix another missing clk_disable_unprepare() in probe (git-fixes).\n- net: gemini: Fix missing free_netdev() in error path of gemini_ethernet_port_probe() (git-fixes).\n- net: geneve: check skb is large enough for IPv4/IPv6 header (git-fixes).\n- net: geneve: modify IP header check in geneve6_xmit_skb and geneve_xmit_skb (git-fixes).\n- net: gianfar: Add of_node_put() before goto statement (git-fixes).\n- net: hdlc: In hdlc_rcv, check to make sure dev is an HDLC device (git-fixes).\n- net: hdlc_raw_eth: Clear the IFF_TX_SKB_SHARING flag after calling ether_setup (git-fixes).\n- net: hns3: Fix for geneve tx checksum bug (git-fixes).\n- net: hns3: Remove the left over redundant check \u0026 assignment (bsc#1154353).\n- net: hns3: Remove un-necessary \u0027else-if\u0027 in the hclge_reset_event() (git-fixes).\n- net: hns3: add check for HNS3_NIC_STATE_INITED in hns3_reset_notify_up_enet() (git-fixes).\n- net: hns3: clear VF down state bit before request link status (git-fixes).\n- net: hns3: clear unnecessary reset request in hclge_reset_rebuild (git-fixes).\n- net: hns3: disable phy loopback setting in hclge_mac_start_phy (git-fixes).\n- net: hns3: fix bug when calculating the TCAM table info (git-fixes).\n- net: hns3: fix for vxlan gpe tx checksum bug (git-fixes).\n- net: hns3: fix incorrect configuration for igu_egu_hw_err (git-fixes).\n- net: hns3: fix query vlan mask value error for flow director (git-fixes).\n- net: hns3: initialize the message content in hclge_get_link_mode() (git-fixes).\n- net: hns3: use netif_tx_disable to stop the transmit queue (git-fixes).\n- net: korina: cast KSEG0 address to pointer in kfree (git-fixes).\n- net: korina: fix kfree of rx/tx descriptor array (git-fixes).\n- net: lantiq: Wait for the GPHY firmware to be ready (git-fixes).\n- net: ll_temac: Add more error handling of dma_map_single() calls (git-fixes).\n- net: ll_temac: Fix RX buffer descriptor handling on GFP_ATOMIC pressure (git-fixes).\n- net: ll_temac: Fix race condition causing TX hang (git-fixes).\n- net: ll_temac: Handle DMA halt condition caused by buffer underrun (git-fixes).\n- net: mvneta: fix double free of txq-\u003ebuf (git-fixes).\n- net: mvneta: make tx buffer array agnostic (git-fixes).\n- net: pasemi: fix error return code in pasemi_mac_open() (git-fixes).\n- net: phy: broadcom: Only advertise EEE for supported modes (git-fixes).\n- net: phy: intel-xway: enable integrated led functions (git-fixes).\n- net: phy: marvell: fix m88e1011_set_downshift (git-fixes).\n- net: phy: marvell: fix m88e1111_set_downshift (git-fixes).\n- net: qcom/emac: add missed clk_disable_unprepare in error path of emac_clks_phase1_init (git-fixes).\n- net: qualcomm: rmnet: Fix incorrect receive packet handling during cleanup (git-fixes).\n- net: sched: disable TCQ_F_NOLOCK for pfifo_fast (bsc#1183405)\n- net: smc911x: Adjust indentation in smc911x_phy_configure (git-fixes).\n- net: spider_net: Fix the size used in a \u0027dma_free_coherent()\u0027 call (git-fixes).\n- net: stmmac: Fix incorrect location to set real_num_rx|tx_queues (git-fixes).\n- net: stmmac: Use rtnl_lock/unlock on netif_set_real_num_rx_queues() call (git-fixes).\n- net: stmmac: fix missing IFF_MULTICAST check in dwmac4_set_filter (git-fixes).\n- net: stmmac: removed enabling eee in EEE set callback (git-fixes).\n- net: stmmac: use netif_tx_start|stop_all_queues() function (git-fixes).\n- net: stmmac: xgmac: fix missing IFF_MULTICAST checki in dwxgmac2_set_filter (git-fixes).\n- net: thunderx: Fix unintentional sign extension issue (git-fixes).\n- net: tulip: Adjust indentation in {dmfe, uli526x}_init_module (git-fixes).\n- net: usb: ax88179_178a: fix missing stop entry in driver_info (git-fixes).\n- net: usb: qmi_wwan: allow qmimux add/del with master up (git-fixes).\n- net: usb: qmi_wwan: support ZTE P685M modem (git-fixes).\n- net: wan/lmc: unregister device when no matching device is found (git-fixes).\n- net:nfc:digital: Fix a double free in digital_tg_recv_dep_req (git-fixes).\n- netdevice: Add missing IFF_PHONY_HEADROOM self-definition (git-fixes).\n- netdevsim: init u64 stats for 32bit hardware (git-fixes).\n- netfilter: conntrack: Make global sysctls readonly in non-init netns (bsc#1176447).\n- netfilter: conntrack: add new sysctl to disable RST check (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: avoid misleading \u0027invalid\u0027 in log message (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: improve RST handling when tuple is re-used (bsc#1183947 bsc#1185950).\n- netfilter: flowtable: Make sure GC works periodically in idle system (bsc#1176447).\n- netfilter: flowtable: fix NAT IPv6 offload mangling (bsc#1176447).\n- netfilter: nftables: allow to update flowtable flags (bsc#1176447).\n- netfilter: nftables: report EOPNOTSUPP on unsupported flowtable flags (bsc#1176447).\n- netsec: restore phy power state after controller reset (bsc#1183757).\n- nfc: pn533: prevent potential memory corruption (git-fixes).\n- nfp: devlink: initialize the devlink port attribute \u0027lanes\u0027 (bsc#1176447).\n- nfp: flower: add ipv6 bit to pre_tunnel control message (bsc#1176447).\n- nfp: flower: fix pre_tun mask id allocation (bsc#1154353).\n- nfp: flower: ignore duplicate merge hints from FW (git-fixes).\n- node: fix device cleanups in error handling code (git-fixes).\n- null_blk: fix passing of REQ_FUA flag in null_handle_rq (git-fixes).\n- nvme-core: add cancel tagset helpers (bsc#1183976).\n- nvme-fabrics: decode host pathing error for connect (bsc#1179827).\n- nvme-fabrics: fix kato initialization (bsc#1182591).\n- nvme-fabrics: only reserve a single tag (bsc#1182077).\n- nvme-fabrics: reject I/O to offline device (bsc#1181161).\n- nvme-fc: check sgl supported by target (bsc#1179827).\n- nvme-fc: clear q_live at beginning of association teardown (bsc#1186479).\n- nvme-fc: fix racing controller reset and create association (bsc#1183048).\n- nvme-fc: return NVME_SC_HOST_ABORTED_CMD when a command has been aborted (bsc#1180197).\n- nvme-fc: return NVME_SC_HOST_ABORTED_CMD when a command has been aborted (bsc#1184259).\n- nvme-fc: set NVME_REQ_CANCELLED in nvme_fc_terminate_exchange() (bsc#1180197).\n- nvme-fc: set NVME_REQ_CANCELLED in nvme_fc_terminate_exchange() (bsc#1184259).\n- nvme-fc: short-circuit reconnect retries (bsc#1179827).\n- nvme-hwmon: Return error code when registration fails (bsc#1177326).\n- nvme-hwmon: Return error code when registration fails (bsc#1177326).\n- nvme-multipath: fix double initialization of ANA state (bsc#1178612, bsc#1184259).\n- nvme-multipath: reset bdev to ns head when failover (bsc#178378 bsc#1182999). \n- nvme-tcp: Fix possible race of io_work and direct send (git-fixes).\n- nvme-tcp: Fix warning with CONFIG_DEBUG_PREEMPT (git-fixes).\n- nvme-tcp: add clean action for failed reconnection (bsc#1183976).\n- nvme-tcp: fix kconfig dependency warning when !CRYPTO (git-fixes).\n- nvme-tcp: fix misuse of __smp_processor_id with preemption (git-fixes).\n- nvme-tcp: fix possible hang waiting for icresp response (bsc#1179519).\n- nvme-tcp: fix possible hang when failing to set io queues (bsc#1181161).\n- nvme-tcp: use cancel tagset helper for tear down (bsc#1183976).\n- nvme: Fix NULL dereference for pci nvme controllers (bsc#1182378).\n- nvme: add \u0027kato\u0027 sysfs attribute (bsc#1179825).\n- nvme: add NVME_REQ_CANCELLED flag in nvme_cancel_request() (bsc#1180197).\n- nvme: add NVME_REQ_CANCELLED flag in nvme_cancel_request() (bsc#1184259).\n- nvme: allocate the keep alive request using BLK_MQ_REQ_NOWAIT (bsc#1182077).\n- nvme: call nvme_identify_ns as the first thing in nvme_alloc_ns_block (bsc#1180197).\n- nvme: clean up the check for too large logic block sizes (bsc#1180197).\n- nvme: define constants for identification values (git-fixes).\n- nvme: do not intialize hwmon for discovery controllers (bsc#1184259).\n- nvme: do not intialize hwmon for discovery controllers (git-fixes).\n- nvme: explicitly update mpath disk capacity on revalidation (git-fixes).\n- nvme: expose reconnect_delay and ctrl_loss_tmo via sysfs (bsc#1182378).\n- nvme: factor out a nvme_configure_metadata helper (bsc#1180197).\n- nvme: fix controller instance leak (git-fixes).\n- nvme: fix initialization of the zone bitmaps (bsc#1180197).\n- nvme: fix possible deadlock when I/O is blocked (git-fixes).\n- nvme: freeze the queue over -\u003elba_shift updates (bsc#1180197).\n- nvme: lift the check for an unallocated namespace into nvme_identify_ns (bsc#1180197).\n- nvme: merge nvme_keep_alive into nvme_keep_alive_work (bsc#1182077).\n- nvme: move nvme_validate_ns (bsc#1180197).\n- nvme: opencode revalidate_disk in nvme_validate_ns (bsc#1180197).\n- nvme: query namespace identifiers before adding the namespace (bsc#1180197).\n- nvme: refactor nvme_validate_ns (bsc#1180197).\n- nvme: remove nvme_identify_ns_list (bsc#1180197).\n- nvme: remove nvme_update_formats (bsc#1180197).\n- nvme: remove superfluous else in nvme_ctrl_loss_tmo_store (bsc#1182378).\n- nvme: remove the 0 lba_shift check in nvme_update_ns_info (bsc#1180197).\n- nvme: remove the disk argument to nvme_update_zone_info (bsc#1180197).\n- nvme: rename __nvme_revalidate_disk (bsc#1180197).\n- nvme: rename _nvme_revalidate_disk (bsc#1180197).\n- nvme: rename nvme_validate_ns to nvme_validate_or_alloc_ns (bsc#1180197).\n- nvme: retrigger ANA log update if group descriptor isn\u0027t found (git-fixes)\n- nvme: return an error if nvme_set_queue_count() fails (bsc#1180197).\n- nvme: revalidate zone bitmaps in nvme_update_ns_info (bsc#1180197).\n- nvme: sanitize KATO setting (bsc#1179825).\n- nvme: set the queue limits in nvme_update_ns_info (bsc#1180197).\n- nvme: simplify error logic in nvme_validate_ns() (bsc#1180197).\n- nvme: simplify error logic in nvme_validate_ns() (bsc#1184259).\n- nvme: update the known admin effects (bsc#1180197).\n- nvmet-rdma: Fix list_del corruption on queue establishment failure (bsc#1183501).\n- nvmet: fix a memory leak (git-fixes).\n- nvmet: seset ns-\u003efile when open fails (bsc#1183873).\n- nvmet: use new ana_log_size instead the old one (bsc#1184259).\n- ocfs2: fix a use after free on error (bsc#1184738).\n- ovl: fix dentry leak in ovl_get_redirect (bsc#1184176).\n- ovl: fix out of date comment and unreachable code (bsc#1184176).\n- ovl: fix regression with re-formatted lower squashfs (bsc#1184176).\n- ovl: fix unneeded call to ovl_change_flags() (bsc#1184176).\n- ovl: fix value of i_ino for lower hardlink corner case (bsc#1184176).\n- ovl: initialize error in ovl_copy_xattr (bsc#1184176).\n- ovl: relax WARN_ON() when decoding lower directory file handle (bsc#1184176).\n- pata_arasan_cf: fix IRQ check (git-fixes).\n- pata_ipx4xx_cf: fix IRQ check (git-fixes).\n- perf/amd/uncore: Fix sysfs type mismatch (bsc#1178134).\n- phy: marvell: ARMADA375_USBCLUSTER_PHY should not default to y, unconditionally (git-fixes).\n- phy: phy-twl4030-usb: Fix possible use-after-free in twl4030_usb_remove() (git-fixes).\n- partitions/ibm: fix non-DASD devices (bsc#1185857 LTC#192526).\n- pinctrl: Ingenic: Add missing pins to the JZ4770 MAC MII group (git-fixes).\n- pinctrl: core: Fix kernel doc string for pin_get_name() (git-fixes).\n- pinctrl: ingenic: Improve unreachable code generation (git-fixes).\n- pinctrl: lewisburg: Update number of pins in community (git-fixes).\n- pinctrl: qcom: spmi-gpio: fix warning about irq chip reusage (git-fixes).\n- pinctrl: rockchip: fix restore error in resume (git-fixes).\n- pinctrl: samsung: use \u0027int\u0027 for register masks in Exynos (git-fixes).\n- platform/mellanox: mlxbf-tmfifo: Fix a memory barrier issue (git-fixes).\n- platform/x86: acer-wmi: Add ACER_CAP_KBD_DOCK quirk for the Aspire Switch 10E SW3-016 (git-fixes).\n- platform/x86: acer-wmi: Add ACER_CAP_SET_FUNCTION_MODE capability flag (git-fixes).\n- platform/x86: acer-wmi: Add new force_caps module parameter (git-fixes).\n- platform/x86: acer-wmi: Add support for SW_TABLET_MODE on Switch devices (git-fixes).\n- platform/x86: acer-wmi: Cleanup ACER_CAP_FOO defines (git-fixes).\n- platform/x86: acer-wmi: Cleanup accelerometer device handling (git-fixes).\n- platform/x86: intel-hid: Support Lenovo ThinkPad X1 Tablet Gen 2 (git-fixes).\n- platform/x86: intel-vbtn: Stop reporting SW_DOCK events (git-fixes).\n- platform/x86: intel_int0002_vgpio: Only call enable_irq_wake() when using s2idle (git-fixes).\n- platform/x86: intel_pmc_core: Do not use global pmcdev in quirks (git-fixes).\n- platform/x86: intel_pmt_crashlog: Fix incorrect macros (git-fixes).\n- platform/x86: pmc_atom: Match all Beckhoff Automation baytrail boards with critclk_systems DMI table (git-fixes).\n- platform/x86: thinkpad_acpi: Allow the FnLock LED to change state (git-fixes).\n- platform/x86: thinkpad_acpi: Correct thermal sensor allocation (git-fixes).\n- posix-timers: Preserve return value in clock_adjtime32() (git-fixes)\n- post.sh: Return an error when module update fails (bsc#1047233 bsc#1184388).\n- power: supply: Use IRQF_ONESHOT (git-fixes).\n- power: supply: generic-adc-battery: fix possible use-after-free in gab_remove() (git-fixes).\n- power: supply: s3c_adc_battery: fix possible use-after-free in s3c_adc_bat_remove() (git-fixes).\n- powerepc/book3s64/hash: Align start/end address correctly with bolt mapping (bsc#1184957).\n- powerpc/64s/exception: Clean up a missed SRR specifier (jsc#SLE-9246 git-fixes).\n- powerpc/64s: Fix crashes when toggling entry flush barrier (bsc#1177666 git-fixes).\n- powerpc/64s: Fix crashes when toggling stf barrier (bsc#1087082 git-fixes).\n- powerpc/64s: Fix instruction encoding for lis in ppc_function_entry() (bsc#1065729).\n- powerpc/64s: Fix pte update for kernel memory on radix (bsc#1055117 git-fixes).\n- powerpc/asm-offsets: GPR14 is not needed either (bsc#1065729).\n- powerpc/book3s64/radix: Remove WARN_ON in destroy_context() (bsc#1183692 ltc#191963).\n- powerpc/eeh: Fix EEH handling for hugepages in ioremap space (bsc#1156395).\n- powerpc/fadump: Mark fadump_calculate_reserve_size as __init (bsc#1065729).\n- powerpc/kexec_file: Use current CPU info while setting up FDT (bsc#1184615 ltc#189835).\n- powerpc/kuap: Restore AMR after replaying soft interrupts (bsc#1156395).\n- powerpc/mm: Add cond_resched() while removing hpte mappings (bsc#1183289 ltc#191637).\n- powerpc/papr_scm: Fix build error due to wrong printf specifier (bsc#1184969).\n- powerpc/papr_scm: Implement support for H_SCM_FLUSH hcall (bsc#1184969).\n- powerpc/perf: Fix PMU constraint check for EBB events (bsc#1065729).\n- powerpc/perf: Fix sampled instruction type for larx/stcx (jsc#SLE-13513).\n- powerpc/perf: Fix the threshold event selection for memory events in power10 (jsc#SLE-13513).\n- powerpc/pmem: Include pmem prototypes (bsc#1113295 git-fixes).\n- powerpc/prom: Mark identical_pvr_fixup as __init (bsc#1065729).\n- powerpc/pseries/mobility: handle premature return from H_JOIN (bsc#1181674 ltc#189159 git-fixes bsc#1183662 ltc#191922).\n- powerpc/pseries/mobility: use struct for shared state (bsc#1181674 ltc#189159 git-fixes bsc#1183662 ltc#191922).\n- powerpc/pseries/ras: Remove unused variable \u0027status\u0027 (bsc#1065729).\n- powerpc/pseries: Add shutdown() to vio_driver and vio_bus (bsc#1184209 ltc#190917).\n- powerpc/pseries: Do not trace hcall tracing wrapper (bsc#1185110 ltc#192091).\n- powerpc/pseries: Fix hcall tracing recursion in pv queued spinlocks (bsc#1185110 ltc#192091).\n- powerpc/pseries: use notrace hcall variant for H_CEDE idle (bsc#1185110 ltc#192091).\n- powerpc/pseries: warn if recursing into the hcall tracing code (bsc#1185110 ltc#192091).\n- powerpc/smp: Reintroduce cpu_core_mask (jsc#SLE-13615 bsc#1180100 ltc#190257 git-fixes).\n- powerpc/sstep: Check instruction validity against ISA version before emulation (bsc#1156395).\n- powerpc/sstep: Check instruction validity against ISA version before emulation (bsc#1156395).\n- powerpc/sstep: Fix darn emulation (bsc#1156395).\n- powerpc/sstep: Fix incorrect return from analyze_instr() (bsc#1156395).\n- powerpc/sstep: Fix load-store and update emulation (bsc#1156395).\n- powerpc/time: Enable sched clock for irqtime (bsc#1156395).\n- powerpc/uaccess: Avoid might_fault() when user access is enabled (bsc#1156395).\n- powerpc/uaccess: Perform barrier_nospec() in KUAP allowance helpers (bsc#1156395).\n- powerpc/uaccess: Simplify unsafe_put_user() implementation (bsc#1156395).\n- powerpc/xive: Drop check on irq_data in xive_core_debug_show() (bsc#1177437 ltc#188522 jsc#SLE-13294 git-fixes).\n- powerpc/xmon: Fix build failure for 8xx (jsc#SLE-12936 git-fixes).\n- powerpc: Fix inverted SET_FULL_REGS bitop (jsc#SLE-9246 git-fixes).\n- powerpc: Fix missing declaration ofable_kernel_vsx() (git-fixes).\n- proc: fix lookup in /proc/net subdirectories after setns(2) (git-fixes).\n- qlcnic: fix error return code in qlcnic_83xx_restart_hw() (git-fixes).\n- qtnfmac: Fix possible buffer overflow in qtnf_event_handle_external_auth (git-fixes).\n- qxl: Fix uninitialised struct field head.surface_id (git-fixes).\n- r8169: do not advertise pause in jumbo mode (git-fixes).\n- r8169: fix DMA being used after buffer free if WoL is enabled (git-fixes).\n- r8169: tweak max read request size for newer chips also in jumbo mtu mode (git-fixes).\n- regmap: set debugfs_name to NULL after it is freed (git-fixes).\n- regulator: Avoid a double \u0027of_node_get\u0027 in \u0027regulator_of_get_init_node()\u0027 (git-fixes).\n- regulator: bd9571mwv: Fix AVS and DVFS voltage range (git-fixes).\n- reintroduce cqhci_suspend for kABI (git-fixes).\n- reiserfs: update reiserfs_xattrs_initialized() condition (bsc#1184737).\n- rsi: Fix TX EAPOL packet handling against iwlwifi AP (git-fixes).\n- rsi: Move card interrupt handling to RX thread (git-fixes).\n- rsi: Use resume_noirq for SDIO (git-fixes).\n- rsxx: remove extraneous \u0027const\u0027 qualifier (git-fixes).\n- rtc: ds1307: Fix wday settings for rx8130 (git-fixes).\n- rtc: fsl-ftm-alarm: add MODULE_TABLE() (bsc#1185454).\n- rtc: fsl-ftm-alarm: avoid struct rtc_time conversions (bsc#1185454).\n- rtc: fsl-ftm-alarm: enable acpi support (bsc#1185454).\n- rtc: fsl-ftm-alarm: fix freeze(s2idle) failed to wake (bsc#1185454).\n- rtc: fsl-ftm-alarm: report alarm to core (bsc#1185454).\n- rtc: fsl-ftm-alarm: switch to ktime_get_real_seconds (bsc#1185454).\n- rtc: fsl-ftm-alarm: switch to rtc_time64_to_tm/rtc_tm_to_time64 (bsc#1185454).\n- rtc: fsl-ftm-alarm: update acpi device id (bsc#1185454).\n- rtc: pcf2127: add alarm support (bsc#1185233).\n- rtc: pcf2127: add pca2129 device id (bsc#1185233).\n- rtc: pcf2127: add tamper detection support (bsc#1185233).\n- rtc: pcf2127: add watchdog feature support (bsc#1185233).\n- rtc: pcf2127: bugfix: watchdog build dependency (bsc#1185233).\n- rtc: pcf2127: cleanup register and bit defines (bsc#1185233).\n- rtc: pcf2127: convert to devm_rtc_allocate_device (bsc#1185233).\n- rtc: pcf2127: fix a bug when not specify interrupts property (bsc#1185233).\n- rtc: pcf2127: fix alarm handling (bsc#1185233).\n- rtc: pcf2127: fix pcf2127_nvmem_read/write() returns (bsc#1185233).\n- rtc: pcf2127: handle boot-enabled watchdog feature (bsc#1185233).\n- rtc: pcf2127: handle timestamp interrupts (bsc#1185495).\n- rtc: pcf2127: let the core handle rtc range (bsc#1185233).\n- rtc: pcf2127: move watchdog initialisation to a separate function (bsc#1185233).\n- rtc: pcf2127: only use watchdog when explicitly available (bsc#1185233).\n- rtc: pcf2127: properly set flag WD_CD for rtc chips(pcf2129, pca2129) (bsc#1185233).\n- rtc: pcf2127: remove unnecessary #ifdef (bsc#1185233).\n- rtc: pcf2127: set regmap max_register (bsc#1185233).\n- rtc: pcf2127: watchdog: handle nowayout feature (bsc#1185233).\n- rtlwifi: 8821ae: upgrade PHY and RF parameters (git-fixes).\n- rtw88: Fix an error code in rtw_debugfs_set_rsvd_page() (git-fixes).\n- rtw88: Fix array overrun in rtw_get_tx_power_params() (git-fixes).\n- rtw88: coex: 8821c: correct antenna switch function (git-fixes).\n- s390/cio: return -EFAULT if copy_to_user() fails (git-fixes).\n- s390/cio: return -EFAULT if copy_to_user() fails (git-fixes).\n- s390/crypto: return -EFAULT if copy_to_user() fails (git-fixes).\n- s390/dasd: fix hanging DASD driver unbind (bsc#1183932 LTC#192153).\n- s390/dasd: fix hanging IO request during DASD driver unbind (git-fixes).\n- s390/entry: save the caller of psw_idle (bsc#1185677).\n- s390/ipl: support NVMe IPL kernel parameters (bsc#1185980 LTC#192679).\n- s390/kdump: fix out-of-memory with PCI (bsc#1182257 LTC#191375).\n- s390/pci: fix leak of PCI device structure (git-fixes).\n- s390/qeth: fix memory leak after failed TX Buffer allocation (git-fixes).\n- s390/qeth: fix notification for pending buffers during teardown (git-fixes).\n- s390/qeth: improve completion of pending TX buffers (git-fixes).\n- s390/qeth: schedule TX NAPI on QAOB completion (git-fixes).\n- s390/vtime: fix increased steal time accounting (bsc#1183859).\n- s390/zcrypt: return EIO when msg retry limit reached (git-fixes).\n- samples, bpf: Add missing munmap in xdpsock (bsc#1155518).\n- samples/bpf: Fix possible hang in xdpsock with multiple threads (bsc#1155518).\n- sata_mv: add IRQ checks (git-fixes).\n- sched/eas: Do not update misfit status if the task is pinned (git-fixes)\n- sched/fair: Avoid stale CPU util_est value for schedutil in (git-fixes)\n- sched/fair: Fix shift-out-of-bounds in load_balance() (git fixes (sched)).\n- sched/fair: Fix unfairness caused by missing load decay (git-fixes)\n- scripts/git_sort/git_sort.py: add bpf git repo\n- scsi: aacraid: Improve compat_ioctl handlers (bsc#1186352).\n- scsi: block: Fix a race in the runtime power management code (git-fixes).\n- scsi: core: Only return started requests from scsi_host_find_tag() (bsc#1179851).\n- scsi: core: Run queue in case of I/O resource contention failure (bsc#1186416).\n- scsi: core: add scsi_host_busy_iter() (bsc#1179851).\n- scsi: fnic: Kill \u0027exclude_id\u0027 argument to fnic_cleanup_io() (bsc#1179851).\n- scsi: fnic: Remove bogus ratelimit messages (bsc#1183249).\n- scsi: libfc: Avoid invoking response handler twice if ep is already completed (bsc#1186573).\n- scsi: lpfc: Add a option to enable interlocked ABTS before job completion (bsc#1186451).\n- scsi: lpfc: Add ndlp kref accounting for resume RPI path (bsc#1186451).\n- scsi: lpfc: Change wording of invalid pci reset log message (bsc#1182574).\n- scsi: lpfc: Correct function header comments related to ndlp reference counting (bsc#1182574).\n- scsi: lpfc: Eliminate use of LPFC_DRIVER_NAME in lpfc_attr.c (bsc#1185472).\n- scsi: lpfc: Fix \u0027Unexpected timeout\u0027 error in direct attach topology (bsc#1186451).\n- scsi: lpfc: Fix ADISC handling that never frees nodes (bsc#1182574).\n- scsi: lpfc: Fix DMA virtual address ptr assignment in bsg (bsc#1185365).\n- scsi: lpfc: Fix FLOGI failure due to accessing a freed node (bsc#1182574).\n- scsi: lpfc: Fix NMI crash during rmmod due to circular hbalock dependency (bsc#1185472).\n- scsi: lpfc: Fix Node recovery when driver is handling simultaneous PLOGIs (bsc#1186451).\n- scsi: lpfc: Fix PLOGI ACC to be transmit after REG_LOGIN (bsc#1182574).\n- scsi: lpfc: Fix a bunch of kernel-doc issues (bsc#1185472).\n- scsi: lpfc: Fix a bunch of kernel-doc misdemeanours (bsc#1185472).\n- scsi: lpfc: Fix a bunch of misnamed functions (bsc#1185472).\n- scsi: lpfc: Fix a few incorrectly named functions (bsc#1185472).\n- scsi: lpfc: Fix a typo (bsc#1185472).\n- scsi: lpfc: Fix bad memory access during VPD DUMP mailbox command (bsc#1186451).\n- scsi: lpfc: Fix crash caused by switch reboot (bsc#1182574).\n- scsi: lpfc: Fix crash when a REG_RPI mailbox fails triggering a LOGO response (bsc#1185472).\n- scsi: lpfc: Fix crash when lpfc_sli4_hba_setup() fails to initialize the SGLs (bsc#1186451).\n- scsi: lpfc: Fix dropped FLOGI during pt2pt discovery recovery (bsc#1182574).\n- scsi: lpfc: Fix error handling for mailboxes completed in MBX_POLL mode (bsc#1185472).\n- scsi: lpfc: Fix formatting and misspelling issues (bsc#1185472).\n- scsi: lpfc: Fix gcc -Wstringop-overread warning (bsc#1185472).\n- scsi: lpfc: Fix illegal memory access on Abort IOCBs (bsc#1183203).\n- scsi: lpfc: Fix incorrect dbde assignment when building target abts wqe (bsc#1182574).\n- scsi: lpfc: Fix incorrect naming of __lpfc_update_fcf_record() (bsc#1185472).\n- scsi: lpfc: Fix incorrectly documented function lpfc_debugfs_commonxripools_data() (bsc#1185472).\n- scsi: lpfc: Fix kernel-doc formatting issue (bsc#1185472).\n- scsi: lpfc: Fix lack of device removal on port swaps with PRLIs (bsc#1185472).\n- scsi: lpfc: Fix lpfc_els_retry() possible null pointer dereference (bsc#1182574).\n- scsi: lpfc: Fix lpfc_hdw_queue attribute being ignored (bsc#1185472).\n- scsi: lpfc: Fix missing FDMI registrations after Mgmt Svc login (bsc#1185472).\n- scsi: lpfc: Fix node handling for Fabric Controller and Domain Controller (bsc#1186451).\n- scsi: lpfc: Fix nodeinfo debugfs output (bsc#1182574).\n- scsi: lpfc: Fix non-optimized ERSP handling (bsc#1186451).\n- scsi: lpfc: Fix null pointer dereference in lpfc_prep_els_iocb() (bsc#1182574).\n- scsi: lpfc: Fix pt2pt connection does not recover after LOGO (bsc#1182574).\n- scsi: lpfc: Fix pt2pt state transition causing rmmod hang (bsc#1182574).\n- scsi: lpfc: Fix reference counting errors in lpfc_cmpl_els_rsp() (bsc#1185472).\n- scsi: lpfc: Fix reftag generation sizing errors (bsc#1182574).\n- scsi: lpfc: Fix rmmod crash due to bad ring pointers to abort_iotag (bsc#1185472).\n- scsi: lpfc: Fix silent memory allocation failure in lpfc_sli4_bsg_link_diag_test() (bsc#1185472).\n- scsi: lpfc: Fix some error codes in debugfs (bsc#1185472).\n- scsi: lpfc: Fix stale node accesses on stale RRQ request (bsc#1182574).\n- scsi: lpfc: Fix status returned in lpfc_els_retry() error exit path (bsc#1182574).\n- scsi: lpfc: Fix unnecessary null check in lpfc_release_scsi_buf (bsc#1182574).\n- scsi: lpfc: Fix unreleased RPIs when NPIV ports are created (bsc#1186451).\n- scsi: lpfc: Fix use after free in lpfc_els_free_iocb (bsc#1182574).\n- scsi: lpfc: Fix use-after-free on unused nodes after port swap (bsc#1185472).\n- scsi: lpfc: Fix various trivial errors in comments and log messages (bsc#1185472).\n- scsi: lpfc: Fix vport indices in lpfc_find_vport_by_vpid() (bsc#1182574).\n- scsi: lpfc: Ignore GID-FT response that may be received after a link flip (bsc#1186451).\n- scsi: lpfc: Reduce LOG_TRACE_EVENT logging for vports (bsc#1182574).\n- scsi: lpfc: Remove unsupported mbox PORT_CAPABILITIES logic (bsc#1185472).\n- scsi: lpfc: Reregister FPIN types if ELS_RDF is received from fabric controller (bsc#1186451).\n- scsi: lpfc: Standardize discovery object logging format (bsc#1185472).\n- scsi: lpfc: Update copyrights for 12.8.0.7 and 12.8.0.8 changes (bsc#1182574).\n- scsi: lpfc: Update lpfc version to 12.8.0.10 (bsc#1186451).\n- scsi: lpfc: Update lpfc version to 12.8.0.8 (bsc#1182574).\n- scsi: lpfc: Update lpfc version to 12.8.0.9 (bsc#1185472).\n- scsi: mpt3sas: Only one vSES is present even when IOC has multi vSES (bsc#1185954).\n- scsi: pm80xx: Do not sleep in atomic context (bsc#1186353).\n- scsi: pm80xx: Fix chip initialization failure (bsc#1186354).\n- scsi: pm80xx: Fix potential infinite loop (bsc#1186354).\n- scsi: pm80xx: Increase timeout for pm80xx mpi_uninit_check() (bsc#1186355).\n- scsi: qla2xxx: Add H:C:T info in the log message for fc ports (bsc#1185491).\n- scsi: qla2xxx: Add error counters to debugfs node (bsc#1185491).\n- scsi: qla2xxx: Always check the return value of qla24xx_get_isp_stats() (bsc#1185491).\n- scsi: qla2xxx: Assign boolean values to a bool variable (bsc#1185491).\n- scsi: qla2xxx: Check kzalloc() return value (bsc#1185491).\n- scsi: qla2xxx: Consolidate zio threshold setting for both FCP \u0026 NVMe (bsc#1185491).\n- scsi: qla2xxx: Constify struct qla_tgt_func_tmpl (bsc#1185491).\n- scsi: qla2xxx: Do logout even if fabric scan retries got exhausted (bsc#1185491).\n- scsi: qla2xxx: Enable NVMe CONF (BIT_7) when enabling SLER (bsc#1185491).\n- scsi: qla2xxx: Fix IOPS drop seen in some adapters (bsc#1185491).\n- scsi: qla2xxx: Fix RISC RESET completion polling (bsc#1185491).\n- scsi: qla2xxx: Fix a couple of misdocumented functions (bsc#1185491).\n- scsi: qla2xxx: Fix a couple of misnamed functions (bsc#1185491).\n- scsi: qla2xxx: Fix broken #endif placement (bsc#1185491).\n- scsi: qla2xxx: Fix crash in PCIe error handling (bsc#1185491).\n- scsi: qla2xxx: Fix crash in qla2xxx_mqueuecommand() (bsc#1185491).\n- scsi: qla2xxx: Fix endianness annotations (bsc#1185491).\n- scsi: qla2xxx: Fix incorrectly named function qla8044_check_temp() (bsc#1185491).\n- scsi: qla2xxx: Fix mailbox Ch erroneous error (bsc#1185491).\n- scsi: qla2xxx: Fix mailbox recovery during PCIe error (bsc#1185491).\n- scsi: qla2xxx: Fix some incorrect formatting/spelling issues (bsc#1185491).\n- scsi: qla2xxx: Fix some memory corruption (bsc#1185491).\n- scsi: qla2xxx: Fix stuck session (bsc#1185491).\n- scsi: qla2xxx: Fix use after free in bsg (bsc#1185491).\n- scsi: qla2xxx: Implementation to get and manage host, target stats and initiator port (bsc#1185491).\n- scsi: qla2xxx: Move some messages from debug to normal log level (bsc#1185491).\n- scsi: qla2xxx: Remove redundant NULL check (bsc#1185491).\n- scsi: qla2xxx: Remove unnecessary NULL check (bsc#1185491).\n- scsi: qla2xxx: Remove unneeded if-null-free check (bsc#1185491).\n- scsi: qla2xxx: Replace __qla2x00_marker()\u0027s missing underscores (bsc#1185491).\n- scsi: qla2xxx: Reserve extra IRQ vectors (bsc#1184436).\n- scsi: qla2xxx: Reuse existing error handling path (bsc#1185491).\n- scsi: qla2xxx: Simplify if statement (bsc#1185491).\n- scsi: qla2xxx: Simplify qla8044_minidump_process_control() (bsc#1185491).\n- scsi: qla2xxx: Simplify the calculation of variables (bsc#1185491).\n- scsi: qla2xxx: Suppress Coverity complaints about dseg_r* (bsc#1185491).\n- scsi: qla2xxx: Update default AER debug mask (bsc#1185491).\n- scsi: qla2xxx: Update version to 10.02.00.105-k (bsc#1185491).\n- scsi: qla2xxx: Update version to 10.02.00.106-k (bsc#1185491).\n- scsi: qla2xxx: Use dma_pool_zalloc() (bsc#1185491).\n- scsi: qla2xxx: Wait for ABTS response on I/O timeouts for NVMe (bsc#1185491).\n- scsi: qla2xxx: fc_remote_port_chkready() returns a SCSI result value (bsc#1185491).\n- scsi: smartpqi: Correct driver removal with HBA disks (bsc#1178089).\n- scsi: smartpqi: Correct driver removal with HBA disks (bsc#1178089).\n- scsi: smartpqi: Correct pqi_sas_smp_handler busy condition (bsc#1178089).\n- scsi: smartpqi: Correct pqi_sas_smp_handler busy condition (bsc#1178089).\n- scsi: smartpqi: Update version to 1.2.16-012 (bsc#1178089).\n- scsi: smartpqi: Update version to 1.2.16-012 (bsc#1178089).\n- scsi: target: pscsi: Avoid OOM in pscsi_map_sg() (bsc#1183843).\n- scsi: target: pscsi: Clean up after failure in pscsi_map_sg() (bsc#1183843).\n- scsi: target: tcmu: Fix use-after-free of se_cmd-\u003epriv (bsc#1186356).\n- scsi: target: tcmu: Fix warning: \u0027page\u0027 may be used uninitialized (bsc#1186357).\n- sctp: delay auto_asconf init until binding the first addr (\u0026lt;cover.1620748346.git.mkubecek@suse.cz\u003e).\n- security: keys: trusted: fix TPM2 authorizations (git-fixes).\n- selftests/bpf: Fix BPF_CORE_READ_BITFIELD() macro (bsc#1177028).\n- selftests/bpf: Fix the ASSERT_ERR_PTR macro (bsc#1177028).\n- selftests/bpf: Mask bpf_csum_diff() return value to 16 bits in test_verifier (bsc#1155518).\n- selftests/bpf: No need to drop the packet when there is no geneve opt (bsc#1155518).\n- selftests/bpf: Re-generate vmlinux.h and BPF skeletons if bpftool changed (bsc#1177028).\n- selftests/bpf: Set gopt opt_class to 0 if get tunnel opt failed (bsc#1155518).\n- selftests/powerpc: Add pkey helpers for rights (bsc#1184934 ltc#191460).\n- selftests/powerpc: Add test for execute-disabled pkeys (bsc#1184934 ltc#191460).\n- selftests/powerpc: Add test for pkey siginfo verification (bsc#1184934 ltc#191460).\n- selftests/powerpc: Add wrapper for gettid (bsc#1184934 ltc#191460).\n- selftests/powerpc: Fix L1D flushing tests for Power10 (bsc#1184934 ltc#191460).\n- selftests/powerpc: Fix exit status of pkey tests (bsc#1184934 ltc#191460).\n- selftests/powerpc: Fix pkey syscall redefinitions (bsc#1184934 ltc#191460).\n- selftests/powerpc: Move pkey helpers to headers (bsc#1184934 ltc#191460).\n- selftests/powerpc: refactor entry and rfi_flush tests (bsc#1184934 ltc#191460).\n- selftests: mlxsw: Remove a redundant if statement in tc_flower_scale test (bsc#1176774).\n- selinux: Fix error return code in sel_ib_pkey_sid_slow() (git-fixes).\n- selinux: fix error initialization in inode_doinit_with_dentry() (git-fixes).\n- selinux: fix inode_doinit_with_dentry() LABEL_INVALID error handling (git-fixes).\n- serial: core: return early on unsupported ioctls (git-fixes).\n- serial: stm32: fix incorrect characters on console (git-fixes).\n- serial: stm32: fix tx_empty condition (git-fixes).\n- smb3: Fix out-of-bounds bug in SMB2_negotiate() (bsc#1183540).\n- smb3: add dynamic trace point to trace when credits obtained (bsc#1181507).\n- smb3: fix crediting for compounding when only one request in flight (bsc#1181507).\n- smc: disallow TCP_ULP in smc_setsockopt() (git-fixes).\n- soc/fsl: qbman: fix conflicting alignment attributes (git-fixes).\n- soc: aspeed: fix a ternary sign expansion bug (git-fixes).\n- soc: fsl: qe: replace qe_io{read,write}* wrappers by generic io{read,write}* (git-fixes).\n- soc: qcom: mdt_loader: Detect truncated read of segments (git-fixes).\n- soc: qcom: mdt_loader: Validate that p_filesz \u0026lt; p_memsz (git-fixes).\n- software node: Fix node registration (git-fixes).\n- soundwire: bus: Fix device found flag correctly (git-fixes).\n- soundwire: stream: fix memory leak in stream config error path (git-fixes).\n- spi: Introduce dspi_slave_abort() function for NXP\u0027s dspi SPI driver (bsc#1167260).\n- spi: ath79: always call chipselect function (git-fixes).\n- spi: ath79: remove spi-master setup and cleanup assignment (git-fixes).\n- spi: cadence: set cqspi to the driver_data field of struct device (git-fixes).\n- spi: dln2: Fix reference leak to master (git-fixes).\n- spi: fsl-dspi: fix NULL pointer dereference (bsc#1167260).\n- spi: fsl-dspi: fix use-after-free in remove path (bsc#1167260).\n- spi: fsl-dspi: fix wrong pointer in suspend/resume (bsc#1167260).\n- spi: fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware() (git-fixes).\n- spi: omap-100k: Fix reference leak to master (git-fixes).\n- spi: qup: fix PM reference leak in spi_qup_remove() (git-fixes).\n- spi: spi-fsl-dspi: Accelerate transfers using larger word size if possible (bsc#1167260).\n- spi: spi-fsl-dspi: Add comments around dspi_pop_tx and dspi_push_rx functions (bsc#1167260).\n- spi: spi-fsl-dspi: Add support for LS1028A (bsc#1167260).\n- spi: spi-fsl-dspi: Adding shutdown hook (bsc#1167260).\n- spi: spi-fsl-dspi: Always use the TCFQ devices in poll mode (bsc#1167260).\n- spi: spi-fsl-dspi: Avoid NULL pointer in dspi_slave_abort for non-DMA mode (bsc#1167260).\n- spi: spi-fsl-dspi: Avoid reading more data than written in EOQ mode (bsc#1167260).\n- spi: spi-fsl-dspi: Change usage pattern of SPI_MCR_* and SPI_CTAR_* macros (bsc#1167260).\n- spi: spi-fsl-dspi: Convert TCFQ users to XSPI FIFO mode (bsc#1167260).\n- spi: spi-fsl-dspi: Convert the instantiations that support it to DMA (bsc#1167260).\n- spi: spi-fsl-dspi: Demistify magic value in SPI_SR_CLEAR (bsc#1167260).\n- spi: spi-fsl-dspi: Do not access reserved fields in SPI_MCR (bsc#1167260).\n- spi: spi-fsl-dspi: Do not mask off undefined bits (bsc#1167260).\n- spi: spi-fsl-dspi: Exit the ISR with IRQ_NONE when it\u0027s not ours (bsc#1167260).\n- spi: spi-fsl-dspi: Fix 16-bit word order in 32-bit XSPI mode (bsc#1167260).\n- spi: spi-fsl-dspi: Fix a resource leak in an error handling path (git-fixes).\n- spi: spi-fsl-dspi: Fix bits-per-word acceleration in DMA mode (bsc#1167260).\n- spi: spi-fsl-dspi: Fix code alignment (bsc#1167260).\n- spi: spi-fsl-dspi: Fix external abort on interrupt in resume or exit paths (bsc#1167260).\n- spi: spi-fsl-dspi: Fix interrupt-less DMA mode taking an XSPI code path (bsc#1167260).\n- spi: spi-fsl-dspi: Fix little endian access to PUSHR CMD and TXDATA (bsc#1167260).\n- spi: spi-fsl-dspi: Fix lockup if device is removed during SPI transfer (bsc#1167260).\n- spi: spi-fsl-dspi: Fix lockup if device is shutdown during SPI transfer (bsc#1167260).\n- spi: spi-fsl-dspi: Fix race condition in TCFQ/EOQ interrupt (bsc#1167260).\n- spi: spi-fsl-dspi: Fix typos (bsc#1167260).\n- spi: spi-fsl-dspi: Free DMA memory with matching function (bsc#1167260).\n- spi: spi-fsl-dspi: Implement .max_message_size method for EOQ mode (bsc#1167260).\n- spi: spi-fsl-dspi: Initialize completion before possible interrupt (bsc#1167260).\n- spi: spi-fsl-dspi: LS2080A and LX2160A support XSPI mode (bsc#1167260).\n- spi: spi-fsl-dspi: Make bus-num property optional (bsc#1167260).\n- spi: spi-fsl-dspi: Move dspi_interrupt above dspi_transfer_one_message (bsc#1167260).\n- spi: spi-fsl-dspi: Move invariant configs out of dspi_transfer_one_message (bsc#1167260).\n- spi: spi-fsl-dspi: Optimize dspi_setup_accel for lowest interrupt count (bsc#1167260).\n- spi: spi-fsl-dspi: Parameterize the FIFO size and DMA buffer size (bsc#1167260).\n- spi: spi-fsl-dspi: Protect against races on dspi-\u003ewords_in_flight (bsc#1167260).\n- spi: spi-fsl-dspi: Reduce indentation in dspi_release_dma() (bsc#1167260).\n- spi: spi-fsl-dspi: Reduce indentation level in dspi_interrupt (bsc#1167260).\n- spi: spi-fsl-dspi: Remove impossible to reach error check (bsc#1167260).\n- spi: spi-fsl-dspi: Remove pointless assignment of master-\u003etransfer to NULL (bsc#1167260).\n- spi: spi-fsl-dspi: Remove unused chip-\u003evoid_write_data (bsc#1167260).\n- spi: spi-fsl-dspi: Remove unused defines and includes (bsc#1167260).\n- spi: spi-fsl-dspi: Remove unused initialization of \u0027ret\u0027 in dspi_probe (bsc#1167260).\n- spi: spi-fsl-dspi: Rename fifo_{read,write} and {tx,cmd}_fifo_write (bsc#1167260).\n- spi: spi-fsl-dspi: Replace interruptible wait queue with a simple completion (bsc#1167260).\n- spi: spi-fsl-dspi: Replace legacy spi_master names with spi_controller (bsc#1167260).\n- spi: spi-fsl-dspi: Simplify bytes_per_word gymnastics (bsc#1167260).\n- spi: spi-fsl-dspi: Take software timestamp in dspi_fifo_write (bsc#1167260).\n- spi: spi-fsl-dspi: Use BIT() and GENMASK() macros (bsc#1167260).\n- spi: spi-fsl-dspi: Use EOQ for last word in buffer even for XSPI mode (bsc#1167260).\n- spi: spi-fsl-dspi: Use dma_request_chan() instead dma_request_slave_channel() (bsc#1167260).\n- spi: spi-fsl-dspi: Use poll mode in case the platform IRQ is missing (bsc#1167260).\n- spi: spi-fsl-dspi: Use reverse Christmas tree declaration order (bsc#1167260).\n- spi: spi-fsl-dspi: Use specific compatible strings for all SoC instantiations (bsc#1167260).\n- spi: spi-fsl-dspi: delete EOQ transfer mode (bsc#1167260).\n- spi: spi-fsl-dspi: fix DMA mapping (bsc#1167260).\n- spi: spi-fsl-dspi: fix native data copy (bsc#1167260).\n- spi: spi-fsl-dspi: remove git-fixes Remove git-fixes. Prepare to update the driver. References: bsc#1167260\n- spi: spi-fsl-dspi: set ColdFire to DMA mode (bsc#1167260).\n- spi: spi-fsl-dspi: use XSPI mode instead of DMA for DPAA2 SoCs (bsc#1167260).\n- spi: spi-ti-qspi: Free DMA resources (git-fixes).\n- spi: stm32: make spurious and overrun interrupts visible (git-fixes).\n- squashfs: fix inode lookup sanity checks (bsc#1183750).\n- squashfs: fix xattr id and id lookup sanity checks (bsc#1183750).\n- staging: bcm2835-audio: Replace unsafe strcpy() with strscpy() (git-fixes).\n- staging: comedi: addi_apci_1032: Fix endian problem for COS sample (git-fixes).\n- staging: comedi: addi_apci_1500: Fix endian problem for command sample (git-fixes).\n- staging: comedi: adv_pci1710: Fix endian problem for AI command data (git-fixes).\n- staging: comedi: cb_pcidas64: fix request_irq() warn (git-fixes).\n- staging: comedi: cb_pcidas: fix request_irq() warn (git-fixes).\n- staging: comedi: das6402: Fix endian problem for AI command data (git-fixes).\n- staging: comedi: das800: Fix endian problem for AI command data (git-fixes).\n- staging: comedi: dmm32at: Fix endian problem for AI command data (git-fixes).\n- staging: comedi: me4000: Fix endian problem for AI command data (git-fixes).\n- staging: comedi: pcl711: Fix endian problem for AI command data (git-fixes).\n- staging: comedi: pcl818: Fix endian problem for AI command data (git-fixes).\n- staging: fwserial: Fix error handling in fwserial_create (git-fixes).\n- staging: fwserial: fix TIOCGSERIAL implementation (git-fixes).\n- staging: fwserial: fix TIOCSSERIAL implementation (git-fixes).\n- staging: fwserial: fix TIOCSSERIAL jiffies conversions (git-fixes).\n- staging: fwserial: fix TIOCSSERIAL permission check (git-fixes).\n- staging: ks7010: prevent buffer overflow in ks_wlan_set_scan() (git-fixes).\n- staging: most: sound: add sanity check for function argument (git-fixes).\n- staging: rtl8188eu: fix potential memory corruption in rtw_check_beacon_data() (git-fixes).\n- staging: rtl8188eu: prevent -\u003essid overflow in rtw_wx_set_scan() (git-fixes).\n- staging: rtl8192e: Change state information from u16 to u8 (git-fixes).\n- staging: rtl8192e: Fix incorrect source in memcpy() (git-fixes).\n- staging: rtl8192e: Fix possible buffer overflow in _rtl92e_wx_set_scan (git-fixes).\n- staging: rtl8192u: Fix potential infinite loop (git-fixes).\n- staging: rtl8192u: fix -\u003essid overflow in r8192_wx_set_scan() (git-fixes).\n- staging: rtl8712: Fix possible buffer overflow in r8712_sitesurvey_cmd (git-fixes).\n- staging: rtl8712: unterminated string leads to read overflow (git-fixes).\n- stop_machine: mark helpers __always_inline (git-fixes).\n- supported.conf:\n- supported.conf: add bsc1185010 dependency\n- supported.conf: mark usb_otg_fsm as supported (bsc#1185010)\n- tcp: fix to update snd_wl1 in bulk receiver fast path (\u0026lt;cover.1620748346.git.mkubecek@suse.cz\u003e).\n- tee: optee: remove need_resched() before cond_resched() (git-fixes).\n- tee: optee: replace might_sleep with cond_resched (git-fixes).\n- thermal/core: Add NULL pointer check before using cooling device stats (git-fixes).\n- thermal/drivers/cpufreq_cooling: Update cpufreq_state only if state has changed (git-fixes).\n- thermal/drivers/ti-soc-thermal/bandgap Remove unused variable \u0027val\u0027 (git-fixes).\n- thermal: thermal_of: Fix error return code of thermal_of_populate_bind_params() (git-fixes).\n- thunderbolt: Fix a leak in tb_retimer_add() (git-fixes).\n- thunderbolt: Fix a leak in tb_retimer_add() (git-fixes).\n- thunderbolt: Fix off by one in tb_port_find_retimer() (git-fixes).\n- thunderbolt: Fix off by one in tb_port_find_retimer() (git-fixes).\n- thunderbolt: Initialize HopID IDAs in tb_switch_alloc() (git-fixes).\n- tools/resolve_btfids: Fix build error with older host toolchains (bsc#1177028).\n- tpm: acpi: Check eventlog signature before using it (git-fixes).\n- tracing: Map all PIDs to command lines (git-fixes).\n- tty: amiserial: fix TIOCSSERIAL permission check (git-fixes).\n- tty: fix memory leak in vc_deallocate (git-fixes).\n- tty: moxa: fix TIOCSSERIAL jiffies conversions (git-fixes).\n- tty: moxa: fix TIOCSSERIAL permission check (git-fixes).\n- tty: serial: lpuart: fix lpuart32_write usage (git-fixes).\n- tty: serial: ucc_uart: replace qe_io{read,write}* wrappers by generic io{read,write}* (git-fixes).\n- udlfb: Fix memory leak in dlfb_usb_probe (git-fixes).\n- uio: uio_hv_generic: use devm_kzalloc() for private data alloc (git-fixes).\n- uio_hv_generic: Fix a memory leak in error handling paths (git-fixes).\n- uio_hv_generic: Fix another memory leak in error handling paths (git-fixes).\n- uio_hv_generic: add missed sysfs_remove_bin_file (git-fixes).\n- usb-storage: Add quirk to defeat Kindle\u0027s automatic unload (git-fixes).\n- usb: Remove dev_err() usage after platform_get_irq() (git-fixes).\n- usb: core: hub: Fix PM reference leak in usb_port_resume() (git-fixes).\n- usb: core: hub: fix race condition about TRSMRCY of resume (git-fixes).\n- usb: dwc2: Fix HPRT0.PrtSusp bit setting for HiKey 960 board (git-fixes).\n- usb: dwc2: Fix gadget DMA unmap direction (git-fixes).\n- usb: dwc2: Fix hibernation between host and device modes (git-fixes).\n- usb: dwc2: Fix host mode hibernation exit with remote wakeup flow (git-fixes).\n- usb: dwc2: Fix session request interrupt handler (git-fixes).\n- usb: dwc2: Prevent core suspend when port connection flag is 0 (git-fixes).\n- usb: dwc3: Switch to use device_property_count_u32() (git-fixes).\n- usb: dwc3: Update soft-reset wait polling rate (git-fixes).\n- usb: dwc3: gadget: Fix START_TRANSFER link state check (git-fixes).\n- usb: dwc3: gadget: Return success always for kick transfer in ep queue (git-fixes).\n- usb: dwc3: keystone: use devm_platform_ioremap_resource() to simplify code (git-fixes).\n- usb: dwc3: meson-g12a: use devm_platform_ioremap_resource() to simplify code (git-fixes).\n- usb: dwc3: omap: improve extcon initialization (git-fixes).\n- usb: dwc3: pci: Enable usb2-gadget-lpm-disable for Intel Merrifield (git-fixes).\n- usb: dwc3: qcom: Add missing DWC3 OF node refcount decrement (git-fixes).\n- usb: dwc3: qcom: Honor wakeup enabled/disabled state (git-fixes).\n- usb: fotg210-hcd: Fix an error message (git-fixes).\n- usb: gadget/function/f_fs string table fix for multiple languages (git-fixes).\n- usb: gadget: Fix double free of device descriptor pointers (git-fixes).\n- usb: gadget: aspeed: fix dma map failure (git-fixes).\n- usb: gadget: configfs: Fix KASAN use-after-free (git-fixes).\n- usb: gadget: dummy_hcd: fix gpf in gadget_setup (git-fixes).\n- usb: gadget: f_uac1: stop playback on function disable (git-fixes).\n- usb: gadget: f_uac1: validate input parameters (git-fixes).\n- usb: gadget: f_uac2: always increase endpoint max_packet_size by one audio slot (git-fixes).\n- usb: gadget: f_uac2: validate input parameters (git-fixes).\n- usb: gadget: pch_udc: Check for DMA mapping error (git-fixes).\n- usb: gadget: pch_udc: Check if driver is present before calling -\u003esetup() (git-fixes).\n- usb: gadget: pch_udc: Move pch_udc_init() to satisfy kernel doc (git-fixes).\n- usb: gadget: pch_udc: Replace cpu_to_le32() by lower_32_bits() (git-fixes).\n- usb: gadget: pch_udc: Revert d3cb25a12138 completely (git-fixes).\n- usb: gadget: r8a66597: Add missing null check on return from platform_get_resource (git-fixes).\n- usb: gadget: udc: amd5536udc_pci fix null-ptr-dereference (git-fixes).\n- usb: gadget: uvc: add bInterval checking for HS mode (git-fixes).\n- usb: musb: Fix suspend with devices connected for a64 (git-fixes).\n- usb: musb: fix PM reference leak in musb_irq_work() (git-fixes).\n- usb: pci-quirks: disable D3cold on xhci suspend for s2idle on AMD Renoire (bsc#1185840).\n- usb: renesas_usbhs: Clear PIPECFG for re-enabling pipe with other EPNUM (git-fixes).\n- usb: roles: Call try_module_get() from usb_role_switch_find_by_fwnode() (git-fixes).\n- usb: roles: Call try_module_get() from usb_role_switch_find_by_fwnode() (git-fixes).\n- usb: sl811-hcd: improve misleading indentation (git-fixes).\n- usb: typec: Remove vdo[3] part of tps6598x_rx_identity_reg struct (git-fixes).\n- usb: typec: tcpci: Check ROLE_CONTROL while interpreting CC_STATUS (git-fixes).\n- usb: typec: tcpm: Address incorrect values of tcpm psy for fixed supply (git-fixes).\n- usb: typec: tcpm: Honour pSnkStdby requirement during negotiation (git-fixes).\n- usb: typec: tcpm: Invoke power_supply_changed for tcpm-source-psy- (git-fixes).\n- usb: typec: tcpm: Invoke power_supply_changed for tcpm-source-psy- (git-fixes).\n- usb: typec: tps6598x: Fix return value check in tps6598x_probe() (git-fixes).\n- usb: typec: tps6598x: Fix return value check in tps6598x_probe() (git-fixes).\n- usb: typec: ucsi: Put fwnode in any case during -\u003eprobe() (git-fixes).\n- usb: webcam: Invalid size of Processing Unit Descriptor (git-fixes).\n- usb: xhci-mtk: fix broken streams issue on 0.96 xHCI (git-fixes).\n- usb: xhci-mtk: improve bandwidth scheduling with TT (git-fixes).\n- usb: xhci-mtk: remove or operator for setting schedule parameters (git-fixes).\n- usb: xhci: Fix ASMedia ASM1042A and ASM3242 DMA addressing (git-fixes).\n- usb: xhci: Fix port minor revision (git-fixes).\n- usb: xhci: Increase timeout for HC halt (git-fixes).\n- usb: xhci: do not perform Soft Retry for some xHCI hosts (git-fixes).\n- usbip: Fix incorrect double assignment to udc-\u003eud.tcp_rx (git-fixes).\n- usbip: fix stub_dev to check for stream socket (git-fixes).\n- usbip: fix stub_dev usbip_sockfd_store() races leading to gpf (git-fixes).\n- usbip: fix vhci_hcd attach_store() races leading to gpf (git-fixes).\n- usbip: fix vhci_hcd to check for stream socket (git-fixes).\n- usbip: fix vudc to check for stream socket (git-fixes).\n- usbip: fix vudc usbip_sockfd_store races leading to gpf (git-fixes).\n- usbip: tools: fix build error for multiple definition (git-fixes).\n- usbip: vhci_hcd fix shift out-of-bounds in vhci_hub_control() (git-fixes).\n- use __netdev_notify_peers in ibmvnic (bsc#1183871 ltc#192139).\n- veth: Store queue_mapping independently of XDP prog presence (git-fixes).\n- vfio-pci/zdev: fix possible segmentation fault issue (git-fixes).\n- vfio/iommu_type1: Populate full dirty when detach non-pinned group (bsc#1183326).\n- vfio/mdev: Do not allow a mdev_type to have a NULL parent pointer (git-fixes).\n- vfio/mdev: Make to_mdev_device() into a static inline (git-fixes).\n- vfio/pci: Add missing range check in vfio_pci_mmap (git-fixes).\n- vfio/pci: Move VGA and VF initialization to functions (git-fixes).\n- vfio/pci: Re-order vfio_pci_probe() (git-fixes).\n- vgacon: Record video mode changes with VT_RESIZEX (git-fixes).\n- video: fbdev: acornfb: remove free_unused_pages() (bsc#1152489)\n- video: hyperv_fb: Add ratelimit on error message (bsc#1185725).\n- video: hyperv_fb: Fix a double free in hvfb_probe (git-fixes).\n- virt_wifi: Return micros for BSS TSF values (git-fixes).\n- virtiofs: fix memory leak in virtio_fs_probe() (bsc#1185558).\n- vrf: fix a comment about loopback device (git-fixes).\n- vt/consolemap: do font sum unsigned (git-fixes).\n- vxlan: do not modify the shared tunnel info when PMTU triggers an ICMP reply (bsc#1176447).\n- vxlan: move debug check after netdev unregister (git-fixes).\n- watchdog/softlockup: Remove obsolete check of last reported task (bsc#1185982).\n- watchdog/softlockup: report the overall time of softlockups (bsc#1185982).\n- watchdog: explicitly update timestamp when reporting softlockup (bsc#1185982).\n- watchdog: rename __touch_watchdog() to a better descriptive name (bsc#1185982).\n- whitespace cleanup\n- wl3501_cs: Fix out-of-bounds warnings in wl3501_mgmt_join (git-fixes).\n- wl3501_cs: Fix out-of-bounds warnings in wl3501_send_pkt (git-fixes).\n- wlcore: Fix command execute failure 19 for wl12xx (git-fixes).\n- workqueue: Minor follow-ups to the rescuer destruction change (bsc#1185911).\n- workqueue: Move the position of debug_work_activate() in __queue_work() (bsc#1184893).\n- workqueue: more destroy_workqueue() fixes (bsc#1185911).\n- x86,swiotlb: Adjust SWIOTLB bounce buffer size for SEV guests (bsc#1186219).\n- x86/crash: Fix crash_setup_memmap_entries() out-of-bounds access (bsc#1152489).\n- x86/fsgsbase/64: Fix NULL deref in 86_fsgsbase_read_task (bsc#1152489).\n- x86/insn: Add some Intel instructions to the opcode map (bsc#1184760).\n- x86/insn: Add some more Intel instructions to the opcode map (bsc#1184760).\n- x86/ioapic: Ignore IRQ2 again (bsc#1152489).\n- x86/mem_encrypt: Correct physical address calculation in __set_clr_pte_enc() (bsc#1152489).\n- x86/microcode: Check for offline CPUs before requesting new microcode (bsc#1152489).\n- x86/mm: Fix NX bit clearing issue in kernel_map_pages_in_pgd (bsc#1152489).\n- x86/platform/uv: Set section block size for hubless architectures (bsc#1152489).\n- x86/reboot: Force all cpus to exit VMX root if VMX is supported (bsc#1152489).\n- x86/sev-es: Invalidate the GHCB after completing VMGEXIT (bsc#1178134).\n- x86/sev-es: Move sev_es_put_ghcb() in prep for follow on patch (bsc#1178134).\n- x86: Introduce TS_COMPAT_RESTART to fix get_nr_restart_syscall() (bsc#1152489).\n- xen/events: avoid handling the same event on two cpus at the same time (git-fixes).\n- xen/events: do not unmask an event channel when an eoi is pending (git-fixes).\n- xen/events: reset affinity of 2-level event when tearing it down (git-fixes).\n- xen/evtchn: Change irq_info lock to raw_spinlock_t (git-fixes).\n- xfrm: Provide private skb extensions for segmented and hw offloaded ESP packets (bsc#1176447).\n- xfs: group quota should return EDQUOT when prj quota enabled (bsc#1180980).\n- xhci: Do not use GFP_KERNEL in (potentially) atomic context (git-fixes).\n- xhci: Fix repeated xhci wake after suspend due to uncleared internal wake state (git-fixes).\n- xhci: Improve detection of device initiated wake signal (git-fixes).\n- xhci: check control context is valid before dereferencing it (git-fixes).\n- xhci: fix potential array out of bounds with several interrupters (git-fixes).\n- xsk: Respect device\u0027s headroom and tailroom on generic xmit path (git-fixes).\n- xsk: Respect device\u0027s headroom and tailroom on generic xmit path (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-1977,SUSE-SLE-Module-Basesystem-15-SP3-2021-1977,SUSE-SLE-Module-Development-Tools-15-SP3-2021-1977,SUSE-SLE-Module-Legacy-15-SP3-2021-1977,SUSE-SLE-Module-Live-Patching-15-SP3-2021-1977,SUSE-SLE-Product-HA-15-SP3-2021-1977,SUSE-SLE-Product-WE-15-SP3-2021-1977",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_1977-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:1977-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20211977-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:1977-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html"
},
{
"category": "self",
"summary": "SUSE Bug 1055117",
"url": "https://bugzilla.suse.com/1055117"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1087082",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "self",
"summary": "SUSE Bug 1113295",
"url": "https://bugzilla.suse.com/1113295"
},
{
"category": "self",
"summary": "SUSE Bug 1133021",
"url": "https://bugzilla.suse.com/1133021"
},
{
"category": "self",
"summary": "SUSE Bug 1152457",
"url": "https://bugzilla.suse.com/1152457"
},
{
"category": "self",
"summary": "SUSE Bug 1152472",
"url": "https://bugzilla.suse.com/1152472"
},
{
"category": "self",
"summary": "SUSE Bug 1152489",
"url": "https://bugzilla.suse.com/1152489"
},
{
"category": "self",
"summary": "SUSE Bug 1153274",
"url": "https://bugzilla.suse.com/1153274"
},
{
"category": "self",
"summary": "SUSE Bug 1154353",
"url": "https://bugzilla.suse.com/1154353"
},
{
"category": "self",
"summary": "SUSE Bug 1155518",
"url": "https://bugzilla.suse.com/1155518"
},
{
"category": "self",
"summary": "SUSE Bug 1156395",
"url": "https://bugzilla.suse.com/1156395"
},
{
"category": "self",
"summary": "SUSE Bug 1160634",
"url": "https://bugzilla.suse.com/1160634"
},
{
"category": "self",
"summary": "SUSE Bug 1164648",
"url": "https://bugzilla.suse.com/1164648"
},
{
"category": "self",
"summary": "SUSE Bug 1167260",
"url": "https://bugzilla.suse.com/1167260"
},
{
"category": "self",
"summary": "SUSE Bug 1167574",
"url": "https://bugzilla.suse.com/1167574"
},
{
"category": "self",
"summary": "SUSE Bug 1167773",
"url": "https://bugzilla.suse.com/1167773"
},
{
"category": "self",
"summary": "SUSE Bug 1168777",
"url": "https://bugzilla.suse.com/1168777"
},
{
"category": "self",
"summary": "SUSE Bug 1168838",
"url": "https://bugzilla.suse.com/1168838"
},
{
"category": "self",
"summary": "SUSE Bug 1169709",
"url": "https://bugzilla.suse.com/1169709"
},
{
"category": "self",
"summary": "SUSE Bug 1171295",
"url": "https://bugzilla.suse.com/1171295"
},
{
"category": "self",
"summary": "SUSE Bug 1173485",
"url": "https://bugzilla.suse.com/1173485"
},
{
"category": "self",
"summary": "SUSE Bug 1174416",
"url": "https://bugzilla.suse.com/1174416"
},
{
"category": "self",
"summary": "SUSE Bug 1174426",
"url": "https://bugzilla.suse.com/1174426"
},
{
"category": "self",
"summary": "SUSE Bug 1175995",
"url": "https://bugzilla.suse.com/1175995"
},
{
"category": "self",
"summary": "SUSE Bug 1176447",
"url": "https://bugzilla.suse.com/1176447"
},
{
"category": "self",
"summary": "SUSE Bug 1176774",
"url": "https://bugzilla.suse.com/1176774"
},
{
"category": "self",
"summary": "SUSE Bug 1177028",
"url": "https://bugzilla.suse.com/1177028"
},
{
"category": "self",
"summary": "SUSE Bug 1177326",
"url": "https://bugzilla.suse.com/1177326"
},
{
"category": "self",
"summary": "SUSE Bug 1177666",
"url": "https://bugzilla.suse.com/1177666"
},
{
"category": "self",
"summary": "SUSE Bug 1178089",
"url": "https://bugzilla.suse.com/1178089"
},
{
"category": "self",
"summary": "SUSE Bug 1178134",
"url": "https://bugzilla.suse.com/1178134"
},
{
"category": "self",
"summary": "SUSE Bug 1178163",
"url": "https://bugzilla.suse.com/1178163"
},
{
"category": "self",
"summary": "SUSE Bug 1178330",
"url": "https://bugzilla.suse.com/1178330"
},
{
"category": "self",
"summary": "SUSE Bug 1178378",
"url": "https://bugzilla.suse.com/1178378"
},
{
"category": "self",
"summary": "SUSE Bug 1178418",
"url": "https://bugzilla.suse.com/1178418"
},
{
"category": "self",
"summary": "SUSE Bug 1179243",
"url": "https://bugzilla.suse.com/1179243"
},
{
"category": "self",
"summary": "SUSE Bug 1179519",
"url": "https://bugzilla.suse.com/1179519"
},
{
"category": "self",
"summary": "SUSE Bug 1179825",
"url": "https://bugzilla.suse.com/1179825"
},
{
"category": "self",
"summary": "SUSE Bug 1179827",
"url": "https://bugzilla.suse.com/1179827"
},
{
"category": "self",
"summary": "SUSE Bug 1179851",
"url": "https://bugzilla.suse.com/1179851"
},
{
"category": "self",
"summary": "SUSE Bug 1180197",
"url": "https://bugzilla.suse.com/1180197"
},
{
"category": "self",
"summary": "SUSE Bug 1180814",
"url": "https://bugzilla.suse.com/1180814"
},
{
"category": "self",
"summary": "SUSE Bug 1180846",
"url": "https://bugzilla.suse.com/1180846"
},
{
"category": "self",
"summary": "SUSE Bug 1181104",
"url": "https://bugzilla.suse.com/1181104"
},
{
"category": "self",
"summary": "SUSE Bug 1181383",
"url": "https://bugzilla.suse.com/1181383"
},
{
"category": "self",
"summary": "SUSE Bug 1181507",
"url": "https://bugzilla.suse.com/1181507"
},
{
"category": "self",
"summary": "SUSE Bug 1181674",
"url": "https://bugzilla.suse.com/1181674"
},
{
"category": "self",
"summary": "SUSE Bug 1181862",
"url": "https://bugzilla.suse.com/1181862"
},
{
"category": "self",
"summary": "SUSE Bug 1182077",
"url": "https://bugzilla.suse.com/1182077"
},
{
"category": "self",
"summary": "SUSE Bug 1182257",
"url": "https://bugzilla.suse.com/1182257"
},
{
"category": "self",
"summary": "SUSE Bug 1182377",
"url": "https://bugzilla.suse.com/1182377"
},
{
"category": "self",
"summary": "SUSE Bug 1182552",
"url": "https://bugzilla.suse.com/1182552"
},
{
"category": "self",
"summary": "SUSE Bug 1182574",
"url": "https://bugzilla.suse.com/1182574"
},
{
"category": "self",
"summary": "SUSE Bug 1182613",
"url": "https://bugzilla.suse.com/1182613"
},
{
"category": "self",
"summary": "SUSE Bug 1182712",
"url": "https://bugzilla.suse.com/1182712"
},
{
"category": "self",
"summary": "SUSE Bug 1182715",
"url": "https://bugzilla.suse.com/1182715"
},
{
"category": "self",
"summary": "SUSE Bug 1182717",
"url": "https://bugzilla.suse.com/1182717"
},
{
"category": "self",
"summary": "SUSE Bug 1182999",
"url": "https://bugzilla.suse.com/1182999"
},
{
"category": "self",
"summary": "SUSE Bug 1183022",
"url": "https://bugzilla.suse.com/1183022"
},
{
"category": "self",
"summary": "SUSE Bug 1183069",
"url": "https://bugzilla.suse.com/1183069"
},
{
"category": "self",
"summary": "SUSE Bug 1183252",
"url": "https://bugzilla.suse.com/1183252"
},
{
"category": "self",
"summary": "SUSE Bug 1183277",
"url": "https://bugzilla.suse.com/1183277"
},
{
"category": "self",
"summary": "SUSE Bug 1183278",
"url": "https://bugzilla.suse.com/1183278"
},
{
"category": "self",
"summary": "SUSE Bug 1183279",
"url": "https://bugzilla.suse.com/1183279"
},
{
"category": "self",
"summary": "SUSE Bug 1183280",
"url": "https://bugzilla.suse.com/1183280"
},
{
"category": "self",
"summary": "SUSE Bug 1183281",
"url": "https://bugzilla.suse.com/1183281"
},
{
"category": "self",
"summary": "SUSE Bug 1183282",
"url": "https://bugzilla.suse.com/1183282"
},
{
"category": "self",
"summary": "SUSE Bug 1183283",
"url": "https://bugzilla.suse.com/1183283"
},
{
"category": "self",
"summary": "SUSE Bug 1183284",
"url": "https://bugzilla.suse.com/1183284"
},
{
"category": "self",
"summary": "SUSE Bug 1183285",
"url": "https://bugzilla.suse.com/1183285"
},
{
"category": "self",
"summary": "SUSE Bug 1183286",
"url": "https://bugzilla.suse.com/1183286"
},
{
"category": "self",
"summary": "SUSE Bug 1183287",
"url": "https://bugzilla.suse.com/1183287"
},
{
"category": "self",
"summary": "SUSE Bug 1183288",
"url": "https://bugzilla.suse.com/1183288"
},
{
"category": "self",
"summary": "SUSE Bug 1183289",
"url": "https://bugzilla.suse.com/1183289"
},
{
"category": "self",
"summary": "SUSE Bug 1183310",
"url": "https://bugzilla.suse.com/1183310"
},
{
"category": "self",
"summary": "SUSE Bug 1183311",
"url": "https://bugzilla.suse.com/1183311"
},
{
"category": "self",
"summary": "SUSE Bug 1183312",
"url": "https://bugzilla.suse.com/1183312"
},
{
"category": "self",
"summary": "SUSE Bug 1183313",
"url": "https://bugzilla.suse.com/1183313"
},
{
"category": "self",
"summary": "SUSE Bug 1183314",
"url": "https://bugzilla.suse.com/1183314"
},
{
"category": "self",
"summary": "SUSE Bug 1183315",
"url": "https://bugzilla.suse.com/1183315"
},
{
"category": "self",
"summary": "SUSE Bug 1183316",
"url": "https://bugzilla.suse.com/1183316"
},
{
"category": "self",
"summary": "SUSE Bug 1183317",
"url": "https://bugzilla.suse.com/1183317"
},
{
"category": "self",
"summary": "SUSE Bug 1183318",
"url": "https://bugzilla.suse.com/1183318"
},
{
"category": "self",
"summary": "SUSE Bug 1183319",
"url": "https://bugzilla.suse.com/1183319"
},
{
"category": "self",
"summary": "SUSE Bug 1183320",
"url": "https://bugzilla.suse.com/1183320"
},
{
"category": "self",
"summary": "SUSE Bug 1183321",
"url": "https://bugzilla.suse.com/1183321"
},
{
"category": "self",
"summary": "SUSE Bug 1183322",
"url": "https://bugzilla.suse.com/1183322"
},
{
"category": "self",
"summary": "SUSE Bug 1183323",
"url": "https://bugzilla.suse.com/1183323"
},
{
"category": "self",
"summary": "SUSE Bug 1183324",
"url": "https://bugzilla.suse.com/1183324"
},
{
"category": "self",
"summary": "SUSE Bug 1183326",
"url": "https://bugzilla.suse.com/1183326"
},
{
"category": "self",
"summary": "SUSE Bug 1183346",
"url": "https://bugzilla.suse.com/1183346"
},
{
"category": "self",
"summary": "SUSE Bug 1183366",
"url": "https://bugzilla.suse.com/1183366"
},
{
"category": "self",
"summary": "SUSE Bug 1183369",
"url": "https://bugzilla.suse.com/1183369"
},
{
"category": "self",
"summary": "SUSE Bug 1183386",
"url": "https://bugzilla.suse.com/1183386"
},
{
"category": "self",
"summary": "SUSE Bug 1183405",
"url": "https://bugzilla.suse.com/1183405"
},
{
"category": "self",
"summary": "SUSE Bug 1183412",
"url": "https://bugzilla.suse.com/1183412"
},
{
"category": "self",
"summary": "SUSE Bug 1183427",
"url": "https://bugzilla.suse.com/1183427"
},
{
"category": "self",
"summary": "SUSE Bug 1183428",
"url": "https://bugzilla.suse.com/1183428"
},
{
"category": "self",
"summary": "SUSE Bug 1183445",
"url": "https://bugzilla.suse.com/1183445"
},
{
"category": "self",
"summary": "SUSE Bug 1183447",
"url": "https://bugzilla.suse.com/1183447"
},
{
"category": "self",
"summary": "SUSE Bug 1183491",
"url": "https://bugzilla.suse.com/1183491"
},
{
"category": "self",
"summary": "SUSE Bug 1183501",
"url": "https://bugzilla.suse.com/1183501"
},
{
"category": "self",
"summary": "SUSE Bug 1183509",
"url": "https://bugzilla.suse.com/1183509"
},
{
"category": "self",
"summary": "SUSE Bug 1183530",
"url": "https://bugzilla.suse.com/1183530"
},
{
"category": "self",
"summary": "SUSE Bug 1183534",
"url": "https://bugzilla.suse.com/1183534"
},
{
"category": "self",
"summary": "SUSE Bug 1183540",
"url": "https://bugzilla.suse.com/1183540"
},
{
"category": "self",
"summary": "SUSE Bug 1183593",
"url": "https://bugzilla.suse.com/1183593"
},
{
"category": "self",
"summary": "SUSE Bug 1183596",
"url": "https://bugzilla.suse.com/1183596"
},
{
"category": "self",
"summary": "SUSE Bug 1183598",
"url": "https://bugzilla.suse.com/1183598"
},
{
"category": "self",
"summary": "SUSE Bug 1183637",
"url": "https://bugzilla.suse.com/1183637"
},
{
"category": "self",
"summary": "SUSE Bug 1183646",
"url": "https://bugzilla.suse.com/1183646"
},
{
"category": "self",
"summary": "SUSE Bug 1183658",
"url": "https://bugzilla.suse.com/1183658"
},
{
"category": "self",
"summary": "SUSE Bug 1183662",
"url": "https://bugzilla.suse.com/1183662"
},
{
"category": "self",
"summary": "SUSE Bug 1183686",
"url": "https://bugzilla.suse.com/1183686"
},
{
"category": "self",
"summary": "SUSE Bug 1183692",
"url": "https://bugzilla.suse.com/1183692"
},
{
"category": "self",
"summary": "SUSE Bug 1183750",
"url": "https://bugzilla.suse.com/1183750"
},
{
"category": "self",
"summary": "SUSE Bug 1183757",
"url": "https://bugzilla.suse.com/1183757"
},
{
"category": "self",
"summary": "SUSE Bug 1183775",
"url": "https://bugzilla.suse.com/1183775"
},
{
"category": "self",
"summary": "SUSE Bug 1183815",
"url": "https://bugzilla.suse.com/1183815"
},
{
"category": "self",
"summary": "SUSE Bug 1183868",
"url": "https://bugzilla.suse.com/1183868"
},
{
"category": "self",
"summary": "SUSE Bug 1183871",
"url": "https://bugzilla.suse.com/1183871"
},
{
"category": "self",
"summary": "SUSE Bug 1183873",
"url": "https://bugzilla.suse.com/1183873"
},
{
"category": "self",
"summary": "SUSE Bug 1183947",
"url": "https://bugzilla.suse.com/1183947"
},
{
"category": "self",
"summary": "SUSE Bug 1183976",
"url": "https://bugzilla.suse.com/1183976"
},
{
"category": "self",
"summary": "SUSE Bug 1184074",
"url": "https://bugzilla.suse.com/1184074"
},
{
"category": "self",
"summary": "SUSE Bug 1184081",
"url": "https://bugzilla.suse.com/1184081"
},
{
"category": "self",
"summary": "SUSE Bug 1184082",
"url": "https://bugzilla.suse.com/1184082"
},
{
"category": "self",
"summary": "SUSE Bug 1184120",
"url": "https://bugzilla.suse.com/1184120"
},
{
"category": "self",
"summary": "SUSE Bug 1184167",
"url": "https://bugzilla.suse.com/1184167"
},
{
"category": "self",
"summary": "SUSE Bug 1184168",
"url": "https://bugzilla.suse.com/1184168"
},
{
"category": "self",
"summary": "SUSE Bug 1184170",
"url": "https://bugzilla.suse.com/1184170"
},
{
"category": "self",
"summary": "SUSE Bug 1184171",
"url": "https://bugzilla.suse.com/1184171"
},
{
"category": "self",
"summary": "SUSE Bug 1184192",
"url": "https://bugzilla.suse.com/1184192"
},
{
"category": "self",
"summary": "SUSE Bug 1184193",
"url": "https://bugzilla.suse.com/1184193"
},
{
"category": "self",
"summary": "SUSE Bug 1184194",
"url": "https://bugzilla.suse.com/1184194"
},
{
"category": "self",
"summary": "SUSE Bug 1184196",
"url": "https://bugzilla.suse.com/1184196"
},
{
"category": "self",
"summary": "SUSE Bug 1184197",
"url": "https://bugzilla.suse.com/1184197"
},
{
"category": "self",
"summary": "SUSE Bug 1184198",
"url": "https://bugzilla.suse.com/1184198"
},
{
"category": "self",
"summary": "SUSE Bug 1184199",
"url": "https://bugzilla.suse.com/1184199"
},
{
"category": "self",
"summary": "SUSE Bug 1184208",
"url": "https://bugzilla.suse.com/1184208"
},
{
"category": "self",
"summary": "SUSE Bug 1184209",
"url": "https://bugzilla.suse.com/1184209"
},
{
"category": "self",
"summary": "SUSE Bug 1184211",
"url": "https://bugzilla.suse.com/1184211"
},
{
"category": "self",
"summary": "SUSE Bug 1184217",
"url": "https://bugzilla.suse.com/1184217"
},
{
"category": "self",
"summary": "SUSE Bug 1184218",
"url": "https://bugzilla.suse.com/1184218"
},
{
"category": "self",
"summary": "SUSE Bug 1184219",
"url": "https://bugzilla.suse.com/1184219"
},
{
"category": "self",
"summary": "SUSE Bug 1184220",
"url": "https://bugzilla.suse.com/1184220"
},
{
"category": "self",
"summary": "SUSE Bug 1184224",
"url": "https://bugzilla.suse.com/1184224"
},
{
"category": "self",
"summary": "SUSE Bug 1184264",
"url": "https://bugzilla.suse.com/1184264"
},
{
"category": "self",
"summary": "SUSE Bug 1184386",
"url": "https://bugzilla.suse.com/1184386"
},
{
"category": "self",
"summary": "SUSE Bug 1184388",
"url": "https://bugzilla.suse.com/1184388"
},
{
"category": "self",
"summary": "SUSE Bug 1184391",
"url": "https://bugzilla.suse.com/1184391"
},
{
"category": "self",
"summary": "SUSE Bug 1184393",
"url": "https://bugzilla.suse.com/1184393"
},
{
"category": "self",
"summary": "SUSE Bug 1184436",
"url": "https://bugzilla.suse.com/1184436"
},
{
"category": "self",
"summary": "SUSE Bug 1184485",
"url": "https://bugzilla.suse.com/1184485"
},
{
"category": "self",
"summary": "SUSE Bug 1184514",
"url": "https://bugzilla.suse.com/1184514"
},
{
"category": "self",
"summary": "SUSE Bug 1184585",
"url": "https://bugzilla.suse.com/1184585"
},
{
"category": "self",
"summary": "SUSE Bug 1184611",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "self",
"summary": "SUSE Bug 1184615",
"url": "https://bugzilla.suse.com/1184615"
},
{
"category": "self",
"summary": "SUSE Bug 1184650",
"url": "https://bugzilla.suse.com/1184650"
},
{
"category": "self",
"summary": "SUSE Bug 1184710",
"url": "https://bugzilla.suse.com/1184710"
},
{
"category": "self",
"summary": "SUSE Bug 1184724",
"url": "https://bugzilla.suse.com/1184724"
},
{
"category": "self",
"summary": "SUSE Bug 1184728",
"url": "https://bugzilla.suse.com/1184728"
},
{
"category": "self",
"summary": "SUSE Bug 1184730",
"url": "https://bugzilla.suse.com/1184730"
},
{
"category": "self",
"summary": "SUSE Bug 1184731",
"url": "https://bugzilla.suse.com/1184731"
},
{
"category": "self",
"summary": "SUSE Bug 1184736",
"url": "https://bugzilla.suse.com/1184736"
},
{
"category": "self",
"summary": "SUSE Bug 1184737",
"url": "https://bugzilla.suse.com/1184737"
},
{
"category": "self",
"summary": "SUSE Bug 1184738",
"url": "https://bugzilla.suse.com/1184738"
},
{
"category": "self",
"summary": "SUSE Bug 1184740",
"url": "https://bugzilla.suse.com/1184740"
},
{
"category": "self",
"summary": "SUSE Bug 1184741",
"url": "https://bugzilla.suse.com/1184741"
},
{
"category": "self",
"summary": "SUSE Bug 1184742",
"url": "https://bugzilla.suse.com/1184742"
},
{
"category": "self",
"summary": "SUSE Bug 1184769",
"url": "https://bugzilla.suse.com/1184769"
},
{
"category": "self",
"summary": "SUSE Bug 1184811",
"url": "https://bugzilla.suse.com/1184811"
},
{
"category": "self",
"summary": "SUSE Bug 1184855",
"url": "https://bugzilla.suse.com/1184855"
},
{
"category": "self",
"summary": "SUSE Bug 1184934",
"url": "https://bugzilla.suse.com/1184934"
},
{
"category": "self",
"summary": "SUSE Bug 1184942",
"url": "https://bugzilla.suse.com/1184942"
},
{
"category": "self",
"summary": "SUSE Bug 1184943",
"url": "https://bugzilla.suse.com/1184943"
},
{
"category": "self",
"summary": "SUSE Bug 1184955",
"url": "https://bugzilla.suse.com/1184955"
},
{
"category": "self",
"summary": "SUSE Bug 1184969",
"url": "https://bugzilla.suse.com/1184969"
},
{
"category": "self",
"summary": "SUSE Bug 1184984",
"url": "https://bugzilla.suse.com/1184984"
},
{
"category": "self",
"summary": "SUSE Bug 1185010",
"url": "https://bugzilla.suse.com/1185010"
},
{
"category": "self",
"summary": "SUSE Bug 1185113",
"url": "https://bugzilla.suse.com/1185113"
},
{
"category": "self",
"summary": "SUSE Bug 1185233",
"url": "https://bugzilla.suse.com/1185233"
},
{
"category": "self",
"summary": "SUSE Bug 1185269",
"url": "https://bugzilla.suse.com/1185269"
},
{
"category": "self",
"summary": "SUSE Bug 1185428",
"url": "https://bugzilla.suse.com/1185428"
},
{
"category": "self",
"summary": "SUSE Bug 1185491",
"url": "https://bugzilla.suse.com/1185491"
},
{
"category": "self",
"summary": "SUSE Bug 1185495",
"url": "https://bugzilla.suse.com/1185495"
},
{
"category": "self",
"summary": "SUSE Bug 1185549",
"url": "https://bugzilla.suse.com/1185549"
},
{
"category": "self",
"summary": "SUSE Bug 1185550",
"url": "https://bugzilla.suse.com/1185550"
},
{
"category": "self",
"summary": "SUSE Bug 1185558",
"url": "https://bugzilla.suse.com/1185558"
},
{
"category": "self",
"summary": "SUSE Bug 1185573",
"url": "https://bugzilla.suse.com/1185573"
},
{
"category": "self",
"summary": "SUSE Bug 1185581",
"url": "https://bugzilla.suse.com/1185581"
},
{
"category": "self",
"summary": "SUSE Bug 1185586",
"url": "https://bugzilla.suse.com/1185586"
},
{
"category": "self",
"summary": "SUSE Bug 1185587",
"url": "https://bugzilla.suse.com/1185587"
},
{
"category": "self",
"summary": "SUSE Bug 1185606",
"url": "https://bugzilla.suse.com/1185606"
},
{
"category": "self",
"summary": "SUSE Bug 1185640",
"url": "https://bugzilla.suse.com/1185640"
},
{
"category": "self",
"summary": "SUSE Bug 1185641",
"url": "https://bugzilla.suse.com/1185641"
},
{
"category": "self",
"summary": "SUSE Bug 1185642",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "self",
"summary": "SUSE Bug 1185645",
"url": "https://bugzilla.suse.com/1185645"
},
{
"category": "self",
"summary": "SUSE Bug 1185670",
"url": "https://bugzilla.suse.com/1185670"
},
{
"category": "self",
"summary": "SUSE Bug 1185680",
"url": "https://bugzilla.suse.com/1185680"
},
{
"category": "self",
"summary": "SUSE Bug 1185703",
"url": "https://bugzilla.suse.com/1185703"
},
{
"category": "self",
"summary": "SUSE Bug 1185725",
"url": "https://bugzilla.suse.com/1185725"
},
{
"category": "self",
"summary": "SUSE Bug 1185736",
"url": "https://bugzilla.suse.com/1185736"
},
{
"category": "self",
"summary": "SUSE Bug 1185758",
"url": "https://bugzilla.suse.com/1185758"
},
{
"category": "self",
"summary": "SUSE Bug 1185796",
"url": "https://bugzilla.suse.com/1185796"
},
{
"category": "self",
"summary": "SUSE Bug 1185840",
"url": "https://bugzilla.suse.com/1185840"
},
{
"category": "self",
"summary": "SUSE Bug 1185857",
"url": "https://bugzilla.suse.com/1185857"
},
{
"category": "self",
"summary": "SUSE Bug 1185898",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "self",
"summary": "SUSE Bug 1185899",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "self",
"summary": "SUSE Bug 1185911",
"url": "https://bugzilla.suse.com/1185911"
},
{
"category": "self",
"summary": "SUSE Bug 1185938",
"url": "https://bugzilla.suse.com/1185938"
},
{
"category": "self",
"summary": "SUSE Bug 1185950",
"url": "https://bugzilla.suse.com/1185950"
},
{
"category": "self",
"summary": "SUSE Bug 1185980",
"url": "https://bugzilla.suse.com/1185980"
},
{
"category": "self",
"summary": "SUSE Bug 1185988",
"url": "https://bugzilla.suse.com/1185988"
},
{
"category": "self",
"summary": "SUSE Bug 1186009",
"url": "https://bugzilla.suse.com/1186009"
},
{
"category": "self",
"summary": "SUSE Bug 1186061",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "self",
"summary": "SUSE Bug 1186111",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "self",
"summary": "SUSE Bug 1186118",
"url": "https://bugzilla.suse.com/1186118"
},
{
"category": "self",
"summary": "SUSE Bug 1186219",
"url": "https://bugzilla.suse.com/1186219"
},
{
"category": "self",
"summary": "SUSE Bug 1186285",
"url": "https://bugzilla.suse.com/1186285"
},
{
"category": "self",
"summary": "SUSE Bug 1186320",
"url": "https://bugzilla.suse.com/1186320"
},
{
"category": "self",
"summary": "SUSE Bug 1186349",
"url": "https://bugzilla.suse.com/1186349"
},
{
"category": "self",
"summary": "SUSE Bug 1186352",
"url": "https://bugzilla.suse.com/1186352"
},
{
"category": "self",
"summary": "SUSE Bug 1186353",
"url": "https://bugzilla.suse.com/1186353"
},
{
"category": "self",
"summary": "SUSE Bug 1186354",
"url": "https://bugzilla.suse.com/1186354"
},
{
"category": "self",
"summary": "SUSE Bug 1186355",
"url": "https://bugzilla.suse.com/1186355"
},
{
"category": "self",
"summary": "SUSE Bug 1186356",
"url": "https://bugzilla.suse.com/1186356"
},
{
"category": "self",
"summary": "SUSE Bug 1186357",
"url": "https://bugzilla.suse.com/1186357"
},
{
"category": "self",
"summary": "SUSE Bug 1186401",
"url": "https://bugzilla.suse.com/1186401"
},
{
"category": "self",
"summary": "SUSE Bug 1186408",
"url": "https://bugzilla.suse.com/1186408"
},
{
"category": "self",
"summary": "SUSE Bug 1186439",
"url": "https://bugzilla.suse.com/1186439"
},
{
"category": "self",
"summary": "SUSE Bug 1186441",
"url": "https://bugzilla.suse.com/1186441"
},
{
"category": "self",
"summary": "SUSE Bug 1186479",
"url": "https://bugzilla.suse.com/1186479"
},
{
"category": "self",
"summary": "SUSE Bug 1186484",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "self",
"summary": "SUSE Bug 1186498",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "self",
"summary": "SUSE Bug 1186501",
"url": "https://bugzilla.suse.com/1186501"
},
{
"category": "self",
"summary": "SUSE Bug 1186512",
"url": "https://bugzilla.suse.com/1186512"
},
{
"category": "self",
"summary": "SUSE Bug 1186681",
"url": "https://bugzilla.suse.com/1186681"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18814 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18814/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19769 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19769/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24586 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24587 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24587/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24588 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25670 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25670/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25671 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25671/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25672 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25672/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25673 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25673/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26139 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26141 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26145 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26145/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26147 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-27170 page",
"url": "https://www.suse.com/security/cve/CVE-2020-27170/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-27171 page",
"url": "https://www.suse.com/security/cve/CVE-2020-27171/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-27673 page",
"url": "https://www.suse.com/security/cve/CVE-2020-27673/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-27815 page",
"url": "https://www.suse.com/security/cve/CVE-2020-27815/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-35519 page",
"url": "https://www.suse.com/security/cve/CVE-2020-35519/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36310 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36310/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36311 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36311/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36312 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36312/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36322 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36322/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20268 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20268/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23134 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-27363 page",
"url": "https://www.suse.com/security/cve/CVE-2021-27363/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-27364 page",
"url": "https://www.suse.com/security/cve/CVE-2021-27364/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-27365 page",
"url": "https://www.suse.com/security/cve/CVE-2021-27365/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28038 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28038/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28375 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28375/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28660 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28660/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28688 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28688/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28950 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28950/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28952 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28952/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28964 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28964/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28971 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28971/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28972 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28972/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-29154 page",
"url": "https://www.suse.com/security/cve/CVE-2021-29154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-29155 page",
"url": "https://www.suse.com/security/cve/CVE-2021-29155/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-29264 page",
"url": "https://www.suse.com/security/cve/CVE-2021-29264/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-29265 page",
"url": "https://www.suse.com/security/cve/CVE-2021-29265/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-29647 page",
"url": "https://www.suse.com/security/cve/CVE-2021-29647/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-29650 page",
"url": "https://www.suse.com/security/cve/CVE-2021-29650/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30002 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30002/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32399 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33034 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33034/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33200 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3428 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3428/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3444 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3444/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3483 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3483/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3489 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3489/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3490 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3490/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3491 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3491/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-06-15T11:06:36Z",
"generator": {
"date": "2021-06-15T11:06:36Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:1977-1",
"initial_release_date": "2021-06-15T11:06:36Z",
"revision_history": [
{
"date": "2021-06-15T11:06:36Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"product": {
"name": "cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"product_id": "cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"product_id": "cluster-md-kmp-default-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"product_id": "cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"product": {
"name": "dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"product_id": "dlm-kmp-64kb-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-59.5.2.aarch64",
"product": {
"name": "dlm-kmp-default-5.3.18-59.5.2.aarch64",
"product_id": "dlm-kmp-default-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"product_id": "dlm-kmp-preempt-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"product": {
"name": "gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"product_id": "gfs2-kmp-64kb-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"product": {
"name": "gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"product_id": "gfs2-kmp-default-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"product_id": "gfs2-kmp-preempt-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-64kb-5.3.18-59.5.2.aarch64",
"product_id": "kernel-64kb-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"product_id": "kernel-64kb-devel-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"product_id": "kernel-64kb-extra-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"product_id": "kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"product_id": "kernel-64kb-optional-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-default-5.3.18-59.5.2.aarch64",
"product_id": "kernel-default-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"product": {
"name": "kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"product_id": "kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"product_id": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-default-devel-5.3.18-59.5.2.aarch64",
"product_id": "kernel-default-devel-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-default-extra-5.3.18-59.5.2.aarch64",
"product_id": "kernel-default-extra-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"product_id": "kernel-default-livepatch-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"product_id": "kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-default-optional-5.3.18-59.5.2.aarch64",
"product_id": "kernel-default-optional-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-59.5.1.aarch64",
"product": {
"name": "kernel-obs-build-5.3.18-59.5.1.aarch64",
"product_id": "kernel-obs-build-5.3.18-59.5.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-59.5.1.aarch64",
"product": {
"name": "kernel-obs-qa-5.3.18-59.5.1.aarch64",
"product_id": "kernel-obs-qa-5.3.18-59.5.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-preempt-5.3.18-59.5.2.aarch64",
"product_id": "kernel-preempt-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"product_id": "kernel-preempt-devel-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"product_id": "kernel-preempt-extra-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"product_id": "kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"product_id": "kernel-preempt-optional-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-59.5.1.aarch64",
"product": {
"name": "kernel-syms-5.3.18-59.5.1.aarch64",
"product_id": "kernel-syms-5.3.18-59.5.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"product": {
"name": "kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"product_id": "kselftests-kmp-64kb-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"product": {
"name": "kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"product_id": "kselftests-kmp-default-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"product_id": "kselftests-kmp-preempt-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"product": {
"name": "ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"product_id": "ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"product_id": "ocfs2-kmp-default-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"product_id": "ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"product": {
"name": "reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"product_id": "reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"product_id": "reiserfs-kmp-default-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"product_id": "reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-5.3.18-59.5.2.noarch",
"product": {
"name": "kernel-devel-5.3.18-59.5.2.noarch",
"product_id": "kernel-devel-5.3.18-59.5.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-5.3.18-59.5.2.noarch",
"product": {
"name": "kernel-docs-5.3.18-59.5.2.noarch",
"product_id": "kernel-docs-5.3.18-59.5.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-5.3.18-59.5.2.noarch",
"product": {
"name": "kernel-docs-html-5.3.18-59.5.2.noarch",
"product_id": "kernel-docs-html-5.3.18-59.5.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-5.3.18-59.5.2.noarch",
"product": {
"name": "kernel-macros-5.3.18-59.5.2.noarch",
"product_id": "kernel-macros-5.3.18-59.5.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-5.3.18-59.5.2.noarch",
"product": {
"name": "kernel-source-5.3.18-59.5.2.noarch",
"product_id": "kernel-source-5.3.18-59.5.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-5.3.18-59.5.2.noarch",
"product": {
"name": "kernel-source-vanilla-5.3.18-59.5.2.noarch",
"product_id": "kernel-source-vanilla-5.3.18-59.5.2.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"product": {
"name": "cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"product_id": "cluster-md-kmp-default-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"product": {
"name": "dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"product_id": "dlm-kmp-default-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"product": {
"name": "gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"product_id": "gfs2-kmp-default-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.3.18-59.5.2.ppc64le",
"product": {
"name": "kernel-debug-5.3.18-59.5.2.ppc64le",
"product_id": "kernel-debug-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"product": {
"name": "kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"product_id": "kernel-debug-devel-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"product": {
"name": "kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"product_id": "kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-59.5.2.ppc64le",
"product": {
"name": "kernel-default-5.3.18-59.5.2.ppc64le",
"product_id": "kernel-default-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"product": {
"name": "kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"product_id": "kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"product_id": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-59.5.2.ppc64le",
"product": {
"name": "kernel-default-devel-5.3.18-59.5.2.ppc64le",
"product_id": "kernel-default-devel-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-59.5.2.ppc64le",
"product": {
"name": "kernel-default-extra-5.3.18-59.5.2.ppc64le",
"product_id": "kernel-default-extra-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"product": {
"name": "kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"product_id": "kernel-default-livepatch-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"product_id": "kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-59.5.2.ppc64le",
"product": {
"name": "kernel-default-optional-5.3.18-59.5.2.ppc64le",
"product_id": "kernel-default-optional-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"product": {
"name": "kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"product_id": "kernel-kvmsmall-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"product_id": "kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"product_id": "kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-59.5.1.ppc64le",
"product": {
"name": "kernel-obs-build-5.3.18-59.5.1.ppc64le",
"product_id": "kernel-obs-build-5.3.18-59.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"product": {
"name": "kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"product_id": "kernel-obs-qa-5.3.18-59.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-59.5.1.ppc64le",
"product": {
"name": "kernel-syms-5.3.18-59.5.1.ppc64le",
"product_id": "kernel-syms-5.3.18-59.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"product": {
"name": "kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"product_id": "kselftests-kmp-default-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"product": {
"name": "ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"product_id": "ocfs2-kmp-default-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"product": {
"name": "reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"product_id": "reiserfs-kmp-default-5.3.18-59.5.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"product": {
"name": "cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"product_id": "cluster-md-kmp-default-5.3.18-59.5.2.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-59.5.2.s390x",
"product": {
"name": "dlm-kmp-default-5.3.18-59.5.2.s390x",
"product_id": "dlm-kmp-default-5.3.18-59.5.2.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-59.5.2.s390x",
"product": {
"name": "gfs2-kmp-default-5.3.18-59.5.2.s390x",
"product_id": "gfs2-kmp-default-5.3.18-59.5.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-59.5.2.s390x",
"product": {
"name": "kernel-default-5.3.18-59.5.2.s390x",
"product_id": "kernel-default-5.3.18-59.5.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"product": {
"name": "kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"product_id": "kernel-default-base-5.3.18-59.5.2.18.2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"product_id": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-59.5.2.s390x",
"product": {
"name": "kernel-default-devel-5.3.18-59.5.2.s390x",
"product_id": "kernel-default-devel-5.3.18-59.5.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-59.5.2.s390x",
"product": {
"name": "kernel-default-extra-5.3.18-59.5.2.s390x",
"product_id": "kernel-default-extra-5.3.18-59.5.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-59.5.2.s390x",
"product": {
"name": "kernel-default-livepatch-5.3.18-59.5.2.s390x",
"product_id": "kernel-default-livepatch-5.3.18-59.5.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"product_id": "kernel-default-livepatch-devel-5.3.18-59.5.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-59.5.2.s390x",
"product": {
"name": "kernel-default-optional-5.3.18-59.5.2.s390x",
"product_id": "kernel-default-optional-5.3.18-59.5.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"product_id": "kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-59.5.1.s390x",
"product": {
"name": "kernel-obs-build-5.3.18-59.5.1.s390x",
"product_id": "kernel-obs-build-5.3.18-59.5.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-59.5.1.s390x",
"product": {
"name": "kernel-obs-qa-5.3.18-59.5.1.s390x",
"product_id": "kernel-obs-qa-5.3.18-59.5.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-59.5.1.s390x",
"product": {
"name": "kernel-syms-5.3.18-59.5.1.s390x",
"product_id": "kernel-syms-5.3.18-59.5.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-5.3.18-59.5.2.s390x",
"product": {
"name": "kernel-zfcpdump-5.3.18-59.5.2.s390x",
"product_id": "kernel-zfcpdump-5.3.18-59.5.2.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-59.5.2.s390x",
"product": {
"name": "kselftests-kmp-default-5.3.18-59.5.2.s390x",
"product_id": "kselftests-kmp-default-5.3.18-59.5.2.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"product": {
"name": "ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"product_id": "ocfs2-kmp-default-5.3.18-59.5.2.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"product": {
"name": "reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"product_id": "reiserfs-kmp-default-5.3.18-59.5.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"product_id": "cluster-md-kmp-default-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"product_id": "cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-59.5.2.x86_64",
"product": {
"name": "dlm-kmp-default-5.3.18-59.5.2.x86_64",
"product_id": "dlm-kmp-default-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"product_id": "dlm-kmp-preempt-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"product": {
"name": "gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"product_id": "gfs2-kmp-default-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"product_id": "gfs2-kmp-preempt-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-debug-5.3.18-59.5.2.x86_64",
"product_id": "kernel-debug-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-debug-devel-5.3.18-59.5.2.x86_64",
"product_id": "kernel-debug-devel-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"product_id": "kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-default-5.3.18-59.5.2.x86_64",
"product_id": "kernel-default-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"product": {
"name": "kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"product_id": "kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"product_id": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-default-devel-5.3.18-59.5.2.x86_64",
"product_id": "kernel-default-devel-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-default-extra-5.3.18-59.5.2.x86_64",
"product_id": "kernel-default-extra-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"product_id": "kernel-default-livepatch-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"product_id": "kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-default-optional-5.3.18-59.5.2.x86_64",
"product_id": "kernel-default-optional-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"product_id": "kernel-kvmsmall-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"product_id": "kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_5-preempt-1-7.5.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-59_5-preempt-1-7.5.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-59_5-preempt-1-7.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-59.5.1.x86_64",
"product": {
"name": "kernel-obs-build-5.3.18-59.5.1.x86_64",
"product_id": "kernel-obs-build-5.3.18-59.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-59.5.1.x86_64",
"product": {
"name": "kernel-obs-qa-5.3.18-59.5.1.x86_64",
"product_id": "kernel-obs-qa-5.3.18-59.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-preempt-5.3.18-59.5.2.x86_64",
"product_id": "kernel-preempt-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"product_id": "kernel-preempt-devel-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"product_id": "kernel-preempt-extra-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"product_id": "kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"product_id": "kernel-preempt-optional-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-59.5.1.x86_64",
"product": {
"name": "kernel-syms-5.3.18-59.5.1.x86_64",
"product_id": "kernel-syms-5.3.18-59.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"product": {
"name": "kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"product_id": "kselftests-kmp-default-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"product_id": "kselftests-kmp-preempt-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"product_id": "ocfs2-kmp-default-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"product_id": "ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"product_id": "reiserfs-kmp-default-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64",
"product_id": "reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Legacy 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-legacy:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15 SP3",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 15 SP3",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:15:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-5.3.18-59.5.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64"
},
"product_reference": "kernel-64kb-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-5.3.18-59.5.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64"
},
"product_reference": "kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-59.5.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64"
},
"product_reference": "kernel-default-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-59.5.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le"
},
"product_reference": "kernel-default-5.3.18-59.5.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-59.5.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x"
},
"product_reference": "kernel-default-5.3.18-59.5.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-59.5.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64"
},
"product_reference": "kernel-default-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le"
},
"product_reference": "kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-59.5.2.18.2.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x"
},
"product_reference": "kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-59.5.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64"
},
"product_reference": "kernel-default-devel-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-59.5.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le"
},
"product_reference": "kernel-default-devel-5.3.18-59.5.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-59.5.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x"
},
"product_reference": "kernel-default-devel-5.3.18-59.5.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-59.5.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-59.5.2.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch"
},
"product_reference": "kernel-devel-5.3.18-59.5.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-59.5.2.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch"
},
"product_reference": "kernel-macros-5.3.18-59.5.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-59.5.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64"
},
"product_reference": "kernel-preempt-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-59.5.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-5.3.18-59.5.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x"
},
"product_reference": "kernel-zfcpdump-5.3.18-59.5.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-59.5.2.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch"
},
"product_reference": "kernel-docs-5.3.18-59.5.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-59.5.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64"
},
"product_reference": "kernel-obs-build-5.3.18-59.5.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-59.5.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le"
},
"product_reference": "kernel-obs-build-5.3.18-59.5.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-59.5.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x"
},
"product_reference": "kernel-obs-build-5.3.18-59.5.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-59.5.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-59.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-59.5.2.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64"
},
"product_reference": "kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-59.5.2.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-59.5.2.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch"
},
"product_reference": "kernel-source-5.3.18-59.5.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-59.5.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64"
},
"product_reference": "kernel-syms-5.3.18-59.5.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-59.5.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le"
},
"product_reference": "kernel-syms-5.3.18-59.5.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-59.5.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x"
},
"product_reference": "kernel-syms-5.3.18-59.5.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-59.5.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-59.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-59.5.2.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-59.5.2.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le"
},
"product_reference": "reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-59.5.2.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x"
},
"product_reference": "reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-59.5.2.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-59.5.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le"
},
"product_reference": "kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-59.5.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x"
},
"product_reference": "kernel-default-livepatch-5.3.18-59.5.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-59.5.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64"
},
"product_reference": "kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-59.5.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-59.5.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-59.5.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le"
},
"product_reference": "cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-59.5.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x"
},
"product_reference": "cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-59.5.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-59.5.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64"
},
"product_reference": "dlm-kmp-default-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-59.5.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le"
},
"product_reference": "dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-59.5.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x"
},
"product_reference": "dlm-kmp-default-5.3.18-59.5.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-59.5.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64"
},
"product_reference": "dlm-kmp-default-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-59.5.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64"
},
"product_reference": "gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-59.5.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le"
},
"product_reference": "gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-59.5.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x"
},
"product_reference": "gfs2-kmp-default-5.3.18-59.5.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-59.5.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64"
},
"product_reference": "gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-59.5.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-59.5.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le"
},
"product_reference": "ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-59.5.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x"
},
"product_reference": "ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-59.5.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.3.18-59.5.2.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP3",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64"
},
"product_reference": "kernel-default-extra-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-extra-5.3.18-59.5.2.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP3",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
},
"product_reference": "kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-18814",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18814"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.3.9. There is a use-after-free when aa_label_parse() fails in aa_audit_rule_init() in security/apparmor/audit.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18814",
"url": "https://www.suse.com/security/cve/CVE-2019-18814"
},
{
"category": "external",
"summary": "SUSE Bug 1156256 for CVE-2019-18814",
"url": "https://bugzilla.suse.com/1156256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "moderate"
}
],
"title": "CVE-2019-18814"
},
{
"cve": "CVE-2019-19769",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19769"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel 5.3.10, there is a use-after-free (read) in the perf_trace_lock_acquire function (related to include/trace/events/lock.h).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19769",
"url": "https://www.suse.com/security/cve/CVE-2019-19769"
},
{
"category": "external",
"summary": "SUSE Bug 1159280 for CVE-2019-19769",
"url": "https://bugzilla.suse.com/1159280"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "moderate"
}
],
"title": "CVE-2019-19769"
},
{
"cve": "CVE-2020-24586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24586"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24586",
"url": "https://www.suse.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "moderate"
}
],
"title": "CVE-2020-24586"
},
{
"cve": "CVE-2020-24587",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24587"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24587",
"url": "https://www.suse.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1185862 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "moderate"
}
],
"title": "CVE-2020-24587"
},
{
"cve": "CVE-2020-24588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24588"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24588",
"url": "https://www.suse.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "SUSE Bug 1185861 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1192868"
},
{
"category": "external",
"summary": "SUSE Bug 1199701 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1199701"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "moderate"
}
],
"title": "CVE-2020-24588"
},
{
"cve": "CVE-2020-25670",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25670"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel where refcount leak in llcp_sock_bind() causing use-after-free which might lead to privilege escalations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25670",
"url": "https://www.suse.com/security/cve/CVE-2020-25670"
},
{
"category": "external",
"summary": "SUSE Bug 1178181 for CVE-2020-25670",
"url": "https://bugzilla.suse.com/1178181"
},
{
"category": "external",
"summary": "SUSE Bug 1194680 for CVE-2020-25670",
"url": "https://bugzilla.suse.com/1194680"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "important"
}
],
"title": "CVE-2020-25670"
},
{
"cve": "CVE-2020-25671",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25671"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel, where a refcount leak in llcp_sock_connect() causing use-after-free which might lead to privilege escalations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25671",
"url": "https://www.suse.com/security/cve/CVE-2020-25671"
},
{
"category": "external",
"summary": "SUSE Bug 1178181 for CVE-2020-25671",
"url": "https://bugzilla.suse.com/1178181"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "important"
}
],
"title": "CVE-2020-25671"
},
{
"cve": "CVE-2020-25672",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25672"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak vulnerability was found in Linux kernel in llcp_sock_connect",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25672",
"url": "https://www.suse.com/security/cve/CVE-2020-25672"
},
{
"category": "external",
"summary": "SUSE Bug 1178181 for CVE-2020-25672",
"url": "https://bugzilla.suse.com/1178181"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "important"
}
],
"title": "CVE-2020-25672"
},
{
"cve": "CVE-2020-25673",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25673"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux kernel where non-blocking socket in llcp_sock_connect() leads to leak and eventually hanging-up the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25673",
"url": "https://www.suse.com/security/cve/CVE-2020-25673"
},
{
"category": "external",
"summary": "SUSE Bug 1178181 for CVE-2020-25673",
"url": "https://bugzilla.suse.com/1178181"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "important"
}
],
"title": "CVE-2020-25673"
},
{
"cve": "CVE-2020-26139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26139"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26139",
"url": "https://www.suse.com/security/cve/CVE-2020-26139"
},
{
"category": "external",
"summary": "SUSE Bug 1186062 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "moderate"
}
],
"title": "CVE-2020-26139"
},
{
"cve": "CVE-2020-26141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26141"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26141",
"url": "https://www.suse.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "SUSE Bug 1185987 for CVE-2020-26141",
"url": "https://bugzilla.suse.com/1185987"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "moderate"
}
],
"title": "CVE-2020-26141"
},
{
"cve": "CVE-2020-26145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26145"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26145",
"url": "https://www.suse.com/security/cve/CVE-2020-26145"
},
{
"category": "external",
"summary": "SUSE Bug 1185860 for CVE-2020-26145",
"url": "https://bugzilla.suse.com/1185860"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "moderate"
}
],
"title": "CVE-2020-26145"
},
{
"cve": "CVE-2020-26147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26147"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26147",
"url": "https://www.suse.com/security/cve/CVE-2020-26147"
},
{
"category": "external",
"summary": "SUSE Bug 1233723 for CVE-2020-26147",
"url": "https://bugzilla.suse.com/1233723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "moderate"
}
],
"title": "CVE-2020-26147"
},
{
"cve": "CVE-2020-27170",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-27170"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.11.8. kernel/bpf/verifier.c performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory, aka CID-f232326f6966. This affects pointer types that do not define a ptr_limit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-27170",
"url": "https://www.suse.com/security/cve/CVE-2020-27170"
},
{
"category": "external",
"summary": "SUSE Bug 1183686 for CVE-2020-27170",
"url": "https://bugzilla.suse.com/1183686"
},
{
"category": "external",
"summary": "SUSE Bug 1183775 for CVE-2020-27170",
"url": "https://bugzilla.suse.com/1183775"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "moderate"
}
],
"title": "CVE-2020-27170"
},
{
"cve": "CVE-2020-27171",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-27171"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.11.8. kernel/bpf/verifier.c has an off-by-one error (with a resultant integer underflow) affecting out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory, aka CID-10d2bb2e6b1d.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-27171",
"url": "https://www.suse.com/security/cve/CVE-2020-27171"
},
{
"category": "external",
"summary": "SUSE Bug 1183686 for CVE-2020-27171",
"url": "https://bugzilla.suse.com/1183686"
},
{
"category": "external",
"summary": "SUSE Bug 1183775 for CVE-2020-27171",
"url": "https://bugzilla.suse.com/1183775"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "moderate"
}
],
"title": "CVE-2020-27171"
},
{
"cve": "CVE-2020-27673",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-27673"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. Guest OS users can cause a denial of service (host OS hang) via a high rate of events to dom0, aka CID-e99502f76271.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-27673",
"url": "https://www.suse.com/security/cve/CVE-2020-27673"
},
{
"category": "external",
"summary": "SUSE Bug 1177411 for CVE-2020-27673",
"url": "https://bugzilla.suse.com/1177411"
},
{
"category": "external",
"summary": "SUSE Bug 1184583 for CVE-2020-27673",
"url": "https://bugzilla.suse.com/1184583"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "moderate"
}
],
"title": "CVE-2020-27673"
},
{
"cve": "CVE-2020-27815",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-27815"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the JFS filesystem code in the Linux Kernel which allows a local attacker with the ability to set extended attributes to panic the system, causing memory corruption or escalating privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-27815",
"url": "https://www.suse.com/security/cve/CVE-2020-27815"
},
{
"category": "external",
"summary": "SUSE Bug 1179454 for CVE-2020-27815",
"url": "https://bugzilla.suse.com/1179454"
},
{
"category": "external",
"summary": "SUSE Bug 1179458 for CVE-2020-27815",
"url": "https://bugzilla.suse.com/1179458"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "important"
}
],
"title": "CVE-2020-27815"
},
{
"cve": "CVE-2020-35519",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-35519"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds (OOB) memory access flaw was found in x25_bind in net/x25/af_x25.c in the Linux kernel version v5.12-rc5. A bounds check failure allows a local attacker with a user account on the system to gain access to out-of-bounds memory, leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-35519",
"url": "https://www.suse.com/security/cve/CVE-2020-35519"
},
{
"category": "external",
"summary": "SUSE Bug 1183696 for CVE-2020-35519",
"url": "https://bugzilla.suse.com/1183696"
},
{
"category": "external",
"summary": "SUSE Bug 1184953 for CVE-2020-35519",
"url": "https://bugzilla.suse.com/1184953"
},
{
"category": "external",
"summary": "SUSE Bug 1211495 for CVE-2020-35519",
"url": "https://bugzilla.suse.com/1211495"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "important"
}
],
"title": "CVE-2020-35519"
},
{
"cve": "CVE-2020-36310",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36310"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.8. arch/x86/kvm/svm/svm.c allows a set_memory_region_test infinite loop for certain nested page faults, aka CID-e72436bc3a52.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36310",
"url": "https://www.suse.com/security/cve/CVE-2020-36310"
},
{
"category": "external",
"summary": "SUSE Bug 1184512 for CVE-2020-36310",
"url": "https://bugzilla.suse.com/1184512"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "moderate"
}
],
"title": "CVE-2020-36310"
},
{
"cve": "CVE-2020-36311",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36311"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.9. arch/x86/kvm/svm/sev.c allows attackers to cause a denial of service (soft lockup) by triggering destruction of a large SEV VM (which requires unregistering many encrypted regions), aka CID-7be74942f184.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36311",
"url": "https://www.suse.com/security/cve/CVE-2020-36311"
},
{
"category": "external",
"summary": "SUSE Bug 1184511 for CVE-2020-36311",
"url": "https://bugzilla.suse.com/1184511"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "low"
}
],
"title": "CVE-2020-36311"
},
{
"cve": "CVE-2020-36312",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36312"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.8.10. virt/kvm/kvm_main.c has a kvm_io_bus_unregister_dev memory leak upon a kmalloc failure, aka CID-f65886606c2d.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36312",
"url": "https://www.suse.com/security/cve/CVE-2020-36312"
},
{
"category": "external",
"summary": "SUSE Bug 1184509 for CVE-2020-36312",
"url": "https://bugzilla.suse.com/1184509"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "low"
}
],
"title": "CVE-2020-36312"
},
{
"cve": "CVE-2020-36322",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36322"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the FUSE filesystem implementation in the Linux kernel before 5.10.6, aka CID-5d069dbe8aaf. fuse_do_getattr() calls make_bad_inode() in inappropriate situations, causing a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36322",
"url": "https://www.suse.com/security/cve/CVE-2020-36322"
},
{
"category": "external",
"summary": "SUSE Bug 1184211 for CVE-2020-36322",
"url": "https://bugzilla.suse.com/1184211"
},
{
"category": "external",
"summary": "SUSE Bug 1184952 for CVE-2020-36322",
"url": "https://bugzilla.suse.com/1184952"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-36322",
"url": "https://bugzilla.suse.com/1189302"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "important"
}
],
"title": "CVE-2020-36322"
},
{
"cve": "CVE-2021-20268",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20268"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds access flaw was found in the Linux kernel\u0027s implementation of the eBPF code verifier in the way a user running the eBPF script calls dev_map_init_map or sock_map_alloc. This flaw allows a local user to crash the system or possibly escalate their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20268",
"url": "https://www.suse.com/security/cve/CVE-2021-20268"
},
{
"category": "external",
"summary": "SUSE Bug 1183077 for CVE-2021-20268",
"url": "https://bugzilla.suse.com/1183077"
},
{
"category": "external",
"summary": "SUSE Bug 1183095 for CVE-2021-20268",
"url": "https://bugzilla.suse.com/1183095"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "important"
}
],
"title": "CVE-2021-20268"
},
{
"cve": "CVE-2021-23134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23134"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23134",
"url": "https://www.suse.com/security/cve/CVE-2021-23134"
},
{
"category": "external",
"summary": "SUSE Bug 1186060 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "external",
"summary": "SUSE Bug 1186061 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "external",
"summary": "SUSE Bug 1220739 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1220739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "important"
}
],
"title": "CVE-2021-23134"
},
{
"cve": "CVE-2021-27363",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-27363"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.3. A kernel pointer leak can be used to determine the address of the iscsi_transport structure. When an iSCSI transport is registered with the iSCSI subsystem, the transport\u0027s handle is available to unprivileged users via the sysfs file system, at /sys/class/iscsi_transport/$TRANSPORT_NAME/handle. When read, the show_transport_handle function (in drivers/scsi/scsi_transport_iscsi.c) is called, which leaks the handle. This handle is actually the pointer to an iscsi_transport struct in the kernel module\u0027s global variables.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-27363",
"url": "https://www.suse.com/security/cve/CVE-2021-27363"
},
{
"category": "external",
"summary": "SUSE Bug 1182716 for CVE-2021-27363",
"url": "https://bugzilla.suse.com/1182716"
},
{
"category": "external",
"summary": "SUSE Bug 1182717 for CVE-2021-27363",
"url": "https://bugzilla.suse.com/1182717"
},
{
"category": "external",
"summary": "SUSE Bug 1183120 for CVE-2021-27363",
"url": "https://bugzilla.suse.com/1183120"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-27363",
"url": "https://bugzilla.suse.com/1200084"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "important"
}
],
"title": "CVE-2021-27363"
},
{
"cve": "CVE-2021-27364",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-27364"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.3. drivers/scsi/scsi_transport_iscsi.c is adversely affected by the ability of an unprivileged user to craft Netlink messages.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-27364",
"url": "https://www.suse.com/security/cve/CVE-2021-27364"
},
{
"category": "external",
"summary": "SUSE Bug 1182715 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1182715"
},
{
"category": "external",
"summary": "SUSE Bug 1182716 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1182716"
},
{
"category": "external",
"summary": "SUSE Bug 1182717 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1182717"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "important"
}
],
"title": "CVE-2021-27364"
},
{
"cve": "CVE-2021-27365",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-27365"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.3. Certain iSCSI data structures do not have appropriate length constraints or checks, and can exceed the PAGE_SIZE value. An unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-27365",
"url": "https://www.suse.com/security/cve/CVE-2021-27365"
},
{
"category": "external",
"summary": "SUSE Bug 1182712 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1182712"
},
{
"category": "external",
"summary": "SUSE Bug 1182715 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1182715"
},
{
"category": "external",
"summary": "SUSE Bug 1183491 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1183491"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "moderate"
}
],
"title": "CVE-2021-27365"
},
{
"cve": "CVE-2021-28038",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28038"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.3, as used with Xen PV. A certain part of the netback driver lacks necessary treatment of errors such as failed memory allocations (as a result of changes to the handling of grant mapping errors). A host OS denial of service may occur during misbehavior of a networking frontend driver. NOTE: this issue exists because of an incomplete fix for CVE-2021-26931.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28038",
"url": "https://www.suse.com/security/cve/CVE-2021-28038"
},
{
"category": "external",
"summary": "SUSE Bug 1183022 for CVE-2021-28038",
"url": "https://bugzilla.suse.com/1183022"
},
{
"category": "external",
"summary": "SUSE Bug 1183069 for CVE-2021-28038",
"url": "https://bugzilla.suse.com/1183069"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "moderate"
}
],
"title": "CVE-2021-28038"
},
{
"cve": "CVE-2021-28375",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28375"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.6. fastrpc_internal_invoke in drivers/misc/fastrpc.c does not prevent user applications from sending kernel RPC messages, aka CID-20c40794eb85. This is a related issue to CVE-2019-2308.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28375",
"url": "https://www.suse.com/security/cve/CVE-2021-28375"
},
{
"category": "external",
"summary": "SUSE Bug 1183596 for CVE-2021-28375",
"url": "https://bugzilla.suse.com/1183596"
},
{
"category": "external",
"summary": "SUSE Bug 1184955 for CVE-2021-28375",
"url": "https://bugzilla.suse.com/1184955"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "important"
}
],
"title": "CVE-2021-28375"
},
{
"cve": "CVE-2021-28660",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28660"
}
],
"notes": [
{
"category": "general",
"text": "rtw_wx_set_scan in drivers/staging/rtl8188eu/os_dep/ioctl_linux.c in the Linux kernel through 5.11.6 allows writing beyond the end of the -\u003essid[] array. NOTE: from the perspective of kernel.org releases, CVE IDs are not normally used for drivers/staging/* (unfinished work); however, system integrators may have situations in which a drivers/staging issue is relevant to their own customer base.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28660",
"url": "https://www.suse.com/security/cve/CVE-2021-28660"
},
{
"category": "external",
"summary": "SUSE Bug 1183593 for CVE-2021-28660",
"url": "https://bugzilla.suse.com/1183593"
},
{
"category": "external",
"summary": "SUSE Bug 1183658 for CVE-2021-28660",
"url": "https://bugzilla.suse.com/1183658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "important"
}
],
"title": "CVE-2021-28660"
},
{
"cve": "CVE-2021-28688",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28688"
}
],
"notes": [
{
"category": "general",
"text": "The fix for XSA-365 includes initialization of pointers such that subsequent cleanup code wouldn\u0027t use uninitialized or stale values. This initialization went too far and may under certain conditions also overwrite pointers which are in need of cleaning up. The lack of cleanup would result in leaking persistent grants. The leak in turn would prevent fully cleaning up after a respective guest has died, leaving around zombie domains. All Linux versions having the fix for XSA-365 applied are vulnerable. XSA-365 was classified to affect versions back to at least 3.11.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28688",
"url": "https://www.suse.com/security/cve/CVE-2021-28688"
},
{
"category": "external",
"summary": "SUSE Bug 1183646 for CVE-2021-28688",
"url": "https://bugzilla.suse.com/1183646"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "moderate"
}
],
"title": "CVE-2021-28688"
},
{
"cve": "CVE-2021-28950",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28950"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in fs/fuse/fuse_i.h in the Linux kernel before 5.11.8. A \"stall on CPU\" can occur because a retry loop continually finds the same bad inode, aka CID-775c5033a0d1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28950",
"url": "https://www.suse.com/security/cve/CVE-2021-28950"
},
{
"category": "external",
"summary": "SUSE Bug 1184194 for CVE-2021-28950",
"url": "https://bugzilla.suse.com/1184194"
},
{
"category": "external",
"summary": "SUSE Bug 1184211 for CVE-2021-28950",
"url": "https://bugzilla.suse.com/1184211"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "moderate"
}
],
"title": "CVE-2021-28950"
},
{
"cve": "CVE-2021-28952",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28952"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.8. The sound/soc/qcom/sdm845.c soundwire device driver has a buffer overflow when an unexpected port ID number is encountered, aka CID-1c668e1c0a0f. (This has been fixed in 5.12-rc4.)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28952",
"url": "https://www.suse.com/security/cve/CVE-2021-28952"
},
{
"category": "external",
"summary": "SUSE Bug 1184197 for CVE-2021-28952",
"url": "https://bugzilla.suse.com/1184197"
},
{
"category": "external",
"summary": "SUSE Bug 1184199 for CVE-2021-28952",
"url": "https://bugzilla.suse.com/1184199"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "important"
}
],
"title": "CVE-2021-28952"
},
{
"cve": "CVE-2021-28964",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28964"
}
],
"notes": [
{
"category": "general",
"text": "A race condition was discovered in get_old_root in fs/btrfs/ctree.c in the Linux kernel through 5.11.8. It allows attackers to cause a denial of service (BUG) because of a lack of locking on an extent buffer before a cloning operation, aka CID-dbcc7d57bffc.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28964",
"url": "https://www.suse.com/security/cve/CVE-2021-28964"
},
{
"category": "external",
"summary": "SUSE Bug 1184193 for CVE-2021-28964",
"url": "https://bugzilla.suse.com/1184193"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "moderate"
}
],
"title": "CVE-2021-28964"
},
{
"cve": "CVE-2021-28971",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28971"
}
],
"notes": [
{
"category": "general",
"text": "In intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c in the Linux kernel through 5.11.8 on some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled, aka CID-d88d05a9e0b6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28971",
"url": "https://www.suse.com/security/cve/CVE-2021-28971"
},
{
"category": "external",
"summary": "SUSE Bug 1184196 for CVE-2021-28971",
"url": "https://bugzilla.suse.com/1184196"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "moderate"
}
],
"title": "CVE-2021-28971"
},
{
"cve": "CVE-2021-28972",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28972"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/pci/hotplug/rpadlpar_sysfs.c in the Linux kernel through 5.11.8, the RPA PCI Hotplug driver has a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly. This occurs because add_slot_store and remove_slot_store mishandle drc_name \u0027\\0\u0027 termination, aka CID-cc7a0bb058b8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28972",
"url": "https://www.suse.com/security/cve/CVE-2021-28972"
},
{
"category": "external",
"summary": "SUSE Bug 1184198 for CVE-2021-28972",
"url": "https://bugzilla.suse.com/1184198"
},
{
"category": "external",
"summary": "SUSE Bug 1220060 for CVE-2021-28972",
"url": "https://bugzilla.suse.com/1220060"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "moderate"
}
],
"title": "CVE-2021-28972"
},
{
"cve": "CVE-2021-29154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-29154"
}
],
"notes": [
{
"category": "general",
"text": "BPF JIT compilers in the Linux kernel through 5.11.12 have incorrect computation of branch displacements, allowing them to execute arbitrary code within the kernel context. This affects arch/x86/net/bpf_jit_comp.c and arch/x86/net/bpf_jit_comp32.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-29154",
"url": "https://www.suse.com/security/cve/CVE-2021-29154"
},
{
"category": "external",
"summary": "SUSE Bug 1184391 for CVE-2021-29154",
"url": "https://bugzilla.suse.com/1184391"
},
{
"category": "external",
"summary": "SUSE Bug 1184710 for CVE-2021-29154",
"url": "https://bugzilla.suse.com/1184710"
},
{
"category": "external",
"summary": "SUSE Bug 1186408 for CVE-2021-29154",
"url": "https://bugzilla.suse.com/1186408"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "moderate"
}
],
"title": "CVE-2021-29154"
},
{
"cve": "CVE-2021-29155",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-29155"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.x. kernel/bpf/verifier.c performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory. Specifically, for sequences of pointer arithmetic operations, the pointer modification performed by the first operation is not correctly accounted for when restricting subsequent operations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-29155",
"url": "https://www.suse.com/security/cve/CVE-2021-29155"
},
{
"category": "external",
"summary": "SUSE Bug 1184942 for CVE-2021-29155",
"url": "https://bugzilla.suse.com/1184942"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "moderate"
}
],
"title": "CVE-2021-29155"
},
{
"cve": "CVE-2021-29264",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-29264"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.10. drivers/net/ethernet/freescale/gianfar.c in the Freescale Gianfar Ethernet driver allows attackers to cause a system crash because a negative fragment size is calculated in situations involving an rx queue overrun when jumbo packets are used and NAPI is enabled, aka CID-d8861bab48b6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-29264",
"url": "https://www.suse.com/security/cve/CVE-2021-29264"
},
{
"category": "external",
"summary": "SUSE Bug 1184168 for CVE-2021-29264",
"url": "https://bugzilla.suse.com/1184168"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "moderate"
}
],
"title": "CVE-2021-29264"
},
{
"cve": "CVE-2021-29265",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-29265"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.11.7. usbip_sockfd_store in drivers/usb/usbip/stub_dev.c allows attackers to cause a denial of service (GPF) because the stub-up sequence has race conditions during an update of the local and shared status, aka CID-9380afd6df70.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-29265",
"url": "https://www.suse.com/security/cve/CVE-2021-29265"
},
{
"category": "external",
"summary": "SUSE Bug 1184167 for CVE-2021-29265",
"url": "https://bugzilla.suse.com/1184167"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "moderate"
}
],
"title": "CVE-2021-29265"
},
{
"cve": "CVE-2021-29647",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-29647"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.11.11. qrtr_recvmsg in net/qrtr/qrtr.c allows attackers to obtain sensitive information from kernel memory because of a partially uninitialized data structure, aka CID-50535249f624.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-29647",
"url": "https://www.suse.com/security/cve/CVE-2021-29647"
},
{
"category": "external",
"summary": "SUSE Bug 1184192 for CVE-2021-29647",
"url": "https://bugzilla.suse.com/1184192"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "moderate"
}
],
"title": "CVE-2021-29647"
},
{
"cve": "CVE-2021-29650",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-29650"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.11.11. The netfilter subsystem allows attackers to cause a denial of service (panic) because net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h lack a full memory barrier upon the assignment of a new table value, aka CID-175e476b8cdf.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-29650",
"url": "https://www.suse.com/security/cve/CVE-2021-29650"
},
{
"category": "external",
"summary": "SUSE Bug 1184208 for CVE-2021-29650",
"url": "https://bugzilla.suse.com/1184208"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "moderate"
}
],
"title": "CVE-2021-29650"
},
{
"cve": "CVE-2021-30002",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30002"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.11.3 when a webcam device exists. video_usercopy in drivers/media/v4l2-core/v4l2-ioctl.c has a memory leak for large arguments, aka CID-fb18802a338b.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30002",
"url": "https://www.suse.com/security/cve/CVE-2021-30002"
},
{
"category": "external",
"summary": "SUSE Bug 1184120 for CVE-2021-30002",
"url": "https://bugzilla.suse.com/1184120"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "moderate"
}
],
"title": "CVE-2021-30002"
},
{
"cve": "CVE-2021-32399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32399"
}
],
"notes": [
{
"category": "general",
"text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32399",
"url": "https://www.suse.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "SUSE Bug 1184611 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "external",
"summary": "SUSE Bug 1185898 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "external",
"summary": "SUSE Bug 1185899 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "important"
}
],
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-33034",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33034"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33034",
"url": "https://www.suse.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "SUSE Bug 1186111 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "external",
"summary": "SUSE Bug 1186285 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "important"
}
],
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-33200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33200"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-\u003ealu_limit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33200",
"url": "https://www.suse.com/security/cve/CVE-2021-33200"
},
{
"category": "external",
"summary": "SUSE Bug 1186484 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "external",
"summary": "SUSE Bug 1186498 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "important"
}
],
"title": "CVE-2021-33200"
},
{
"cve": "CVE-2021-3428",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3428"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel. A denial of service problem is identified if an extent tree is corrupted in a crafted ext4 filesystem in fs/ext4/extents.c in ext4_es_cache_extent. Fabricating an integer overflow, A local attacker with a special user privilege may cause a system crash problem which can lead to an availability threat.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3428",
"url": "https://www.suse.com/security/cve/CVE-2021-3428"
},
{
"category": "external",
"summary": "SUSE Bug 1173485 for CVE-2021-3428",
"url": "https://bugzilla.suse.com/1173485"
},
{
"category": "external",
"summary": "SUSE Bug 1183509 for CVE-2021-3428",
"url": "https://bugzilla.suse.com/1183509"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "low"
}
],
"title": "CVE-2021-3428"
},
{
"cve": "CVE-2021-3444",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3444"
}
],
"notes": [
{
"category": "general",
"text": "The bpf verifier in the Linux kernel did not properly handle mod32 destination register truncation when the source register was known to be 0. A local attacker with the ability to load bpf programs could use this gain out-of-bounds reads in kernel memory leading to information disclosure (kernel memory), and possibly out-of-bounds writes that could potentially lead to code execution. This issue was addressed in the upstream kernel in commit 9b00f1b78809 (\"bpf: Fix truncation handling for mod32 dst reg wrt zero\") and in Linux stable kernels 5.11.2, 5.10.19, and 5.4.101.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3444",
"url": "https://www.suse.com/security/cve/CVE-2021-3444"
},
{
"category": "external",
"summary": "SUSE Bug 1184170 for CVE-2021-3444",
"url": "https://bugzilla.suse.com/1184170"
},
{
"category": "external",
"summary": "SUSE Bug 1184171 for CVE-2021-3444",
"url": "https://bugzilla.suse.com/1184171"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "moderate"
}
],
"title": "CVE-2021-3444"
},
{
"cve": "CVE-2021-3483",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3483"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Nosy driver in the Linux kernel. This issue allows a device to be inserted twice into a doubly-linked list, leading to a use-after-free when one of these devices is removed. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. Versions before kernel 5.12-rc6 are affected",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3483",
"url": "https://www.suse.com/security/cve/CVE-2021-3483"
},
{
"category": "external",
"summary": "SUSE Bug 1184393 for CVE-2021-3483",
"url": "https://bugzilla.suse.com/1184393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "moderate"
}
],
"title": "CVE-2021-3483"
},
{
"cve": "CVE-2021-3489",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3489"
}
],
"notes": [
{
"category": "general",
"text": "The eBPF RINGBUF bpf_ringbuf_reserve() function in the Linux kernel did not check that the allocated size was smaller than the ringbuf size, allowing an attacker to perform out-of-bounds writes within the kernel and therefore, arbitrary code execution. This issue was fixed via commit 4b81ccebaeee (\"bpf, ringbuf: Deny reserve of buffers larger than ringbuf\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced via 457f44363a88 (\"bpf: Implement BPF ring buffer and verifier support for it\") (v5.8-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3489",
"url": "https://www.suse.com/security/cve/CVE-2021-3489"
},
{
"category": "external",
"summary": "SUSE Bug 1185640 for CVE-2021-3489",
"url": "https://bugzilla.suse.com/1185640"
},
{
"category": "external",
"summary": "SUSE Bug 1185856 for CVE-2021-3489",
"url": "https://bugzilla.suse.com/1185856"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "important"
}
],
"title": "CVE-2021-3489"
},
{
"cve": "CVE-2021-3490",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3490"
}
],
"notes": [
{
"category": "general",
"text": "The eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) in the Linux kernel did not properly update 32-bit bounds, which could be turned into out of bounds reads and writes in the Linux kernel and therefore, arbitrary code execution. This issue was fixed via commit 049c4e13714e (\"bpf: Fix alu32 const subreg bound tracking on bitwise operations\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. The AND/OR issues were introduced by commit 3f50f132d840 (\"bpf: Verifier, do explicit ALU32 bounds tracking\") (5.7-rc1) and the XOR variant was introduced by 2921c90d4718 (\"bpf:Fix a verifier failure with xor\") ( 5.10-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3490",
"url": "https://www.suse.com/security/cve/CVE-2021-3490"
},
{
"category": "external",
"summary": "SUSE Bug 1185641 for CVE-2021-3490",
"url": "https://bugzilla.suse.com/1185641"
},
{
"category": "external",
"summary": "SUSE Bug 1185796 for CVE-2021-3490",
"url": "https://bugzilla.suse.com/1185796"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "important"
}
],
"title": "CVE-2021-3490"
},
{
"cve": "CVE-2021-3491",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3491"
}
],
"notes": [
{
"category": "general",
"text": "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3491",
"url": "https://www.suse.com/security/cve/CVE-2021-3491"
},
{
"category": "external",
"summary": "SUSE Bug 1185642 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "external",
"summary": "SUSE Bug 1187090 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1187090"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "important"
}
],
"title": "CVE-2021-3491"
}
]
}
suse-su-2021:2208-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP2 RT kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-33200: Enforcing incorrect limits for pointer arithmetic operations by the BPF verifier could be abused to perform out-of-bounds reads and writes in kernel memory (bsc#1186484).\n- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values. (bsc#1186111)\n- CVE-2020-26139: Fixed a denial-of-service when an Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. (bnc#1186062)\n- CVE-2021-23134: A Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges. (bnc#1186060)\n- CVE-2021-3491: Fixed a potential heap overflow in mem_rw(). This vulnerability is related to the PROVIDE_BUFFERS operation, which allowed the MAX_RW_COUNT limit to be bypassed (bsc#1185642).\n- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).\n- CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances this can be abused to inject arbitrary network packets and/or exfiltrate user data (bnc#1185859).\n- CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed (bnc#1185859 bnc#1185862).\n- CVE-2020-26147: The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments, even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used (bnc#1185859).\n- CVE-2020-24588: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets. (bnc#1185861)\n- CVE-2020-26145: An issue was discovered with Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration. (bnc#1185860)\n- CVE-2020-26141: An issue was discovered in the ALFA driver for AWUS036H, where the Message Integrity Check (authenticity) of fragmented TKIP frames was not verified. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bnc#1185987)\n\nThe following non-security bugs were fixed:\n\n- ACPI / hotplug / PCI: Fix reference count leak in enable_slot() (git-fixes).\n- ACPI: GTDT: Do not corrupt interrupt mappings on watchdow probe failure (git-fixes).\n- ACPI: custom_method: fix a possible memory leak (git-fixes).\n- ACPI: custom_method: fix potential use-after-free issue (git-fixes).\n- ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro (git-fixes).\n- ALSA: bebob: enable to deliver MIDI messages for multiple ports (git-fixes).\n- ALSA: dice: fix stream format at middle sampling rate for Alesis iO 26 (git-fixes).\n- ALSA: dice: fix stream format for TC Electronic Konnekt Live at high sampling transfer frequency (git-fixes).\n- ALSA: firewire-lib: fix calculation for size of IR context payload (git-fixes).\n- ALSA: firewire-lib: fix check for the size of isochronous packet payload (git-fixes).\n- ALSA: hda/conexant: Re-order CX5066 quirk table entries (git-fixes).\n- ALSA: hda/realtek: ALC285 Thinkpad jack pin quirk is unreachable (git-fixes).\n- ALSA: hda/realtek: Add some CLOVE SSIDs of ALC293 (git-fixes).\n- ALSA: hda/realtek: Headphone volume is controlled by Front mixer (git-fixes).\n- ALSA: hda/realtek: reset eapd coeff to default value for alc287 (git-fixes).\n- ALSA: hda: fixup headset for ASUS GU502 laptop (git-fixes).\n- ALSA: hda: generic: change the DAC ctl name for LO+SPK or LO+HP (git-fixes).\n- ALSA: hdsp: do not disable if not enabled (git-fixes).\n- ALSA: hdspm: do not disable if not enabled (git-fixes).\n- ALSA: intel8x0: Do not update period unless prepared (git-fixes).\n- ALSA: line6: Fix racy initialization of LINE6 MIDI (git-fixes).\n- ALSA: rme9652: do not disable if not enabled (git-fixes).\n- ALSA: usb-audio: Validate MS endpoint descriptors (git-fixes).\n- ALSA: usb-audio: fix control-request direction (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix device hang with ehci-pci (git-fixes).\n- ALSA: usb-audio: scarlett2: Improve driver startup messages (git-fixes).\n- ALSA: usb-audio: scarlett2: snd_scarlett_gen2_controls_create() can be static (git-fixes).\n- ARM64: vdso32: Install vdso32 from vdso_install (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for the Chuwi Hi8 tablet (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Enable jack-detect support on Asus T100TAF (git-fixes).\n- ASoC: cs35l33: fix an error code in probe() (git-fixes).\n- ASoC: cs42l42: Regmap must use_single_read/write (git-fixes).\n- ASoC: rsnd: call rsnd_ssi_master_clk_start() from rsnd_ssi_init() (git-fixes).\n- ASoC: rsnd: core: Check convert rate in rsnd_hw_params (git-fixes).\n- ASoC: rt286: Generalize support for ALC3263 codec (git-fixes).\n- ASoC: rt286: Make RT286_SET_GPIO_* readable and writable (git-fixes).\n- Bluetooth: L2CAP: Fix handling LE modes by L2CAP_OPTIONS (git-fixes).\n- Bluetooth: SMP: Fail if remote and local public keys are identical (git-fixes).\n- Bluetooth: Set CONF_NOT_COMPLETE as l2cap_chan default (git-fixes).\n- Bluetooth: check for zapped sk before connecting (git-fixes).\n- Bluetooth: initialize skb_queue_head at l2cap_chan_create() (git-fixes).\n- Drivers: hv: vmbus: Fix Suspend-to-Idle for Generation-2 VM (git-fixes).\n- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185725).\n- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185725).\n- Drivers: hv: vmbus: Use after free in __vmbus_open() (git-fixes).\n- Input: elants_i2c - do not bind to i2c-hid compatible ACPI instantiated devices (git-fixes).\n- Input: silead - add workaround for x86 BIOS-es which bring the chip up in a stuck state (git-fixes).\n- KVM: s390: fix guarded storage control register handling (bsc#1133021).\n- Move upstreamed media fixes into sorted section\n- NFC: nci: fix memory leak in nci_allocate_device (git-fixes).\n- PCI/RCEC: Fix RCiEP device to RCEC association (git-fixes).\n- PCI: Allow VPD access for QLogic ISP2722 (git-fixes).\n- PCI: PM: Do not read power state in pci_enable_device_flags() (git-fixes).\n- PCI: Release OF node in pci_scan_device()\u0027s error path (git-fixes).\n- PCI: endpoint: Fix missing destroy_workqueue() (git-fixes).\n- PCI: iproc: Fix return value of iproc_msi_irq_domain_alloc() (git-fixes).\n- PCI: thunder: Fix compile testing (git-fixes).\n- PM / devfreq: Use more accurate returned new_freq as resume_freq (git-fixes).\n- RDMA/addr: create addr_wq with WQ_MEM_RECLAIM flag (bsc#1183346).\n- RDMA/core: create ib_cm with WQ_MEM_RECLAIM flag (bsc#1183346).\n- RDMA/hns: Delete redundant abnormal interrupt status (git-fixes).\n- RDMA/hns: Delete redundant condition judgment related to eq (git-fixes).\n- RDMA/qedr: Fix error return code in qedr_iw_connect() (jsc#SLE-8215).\n- RDMA/srpt: Fix error return code in srpt_cm_req_recv() (git-fixes).\n- SUNRPC in case of backlog, hand free slots directly to waiting task (bsc#1185428).\n- SUNRPC: More fixes for backlog congestion (bsc#1185428).\n- USB: Add LPM quirk for Lenovo ThinkPad USB-C Dock Gen2 Ethernet (git-fixes).\n- USB: Add reset-resume quirk for WD19\u0027s Realtek Hub (git-fixes).\n- USB: serial: pl2303: add support for PL2303HXN (bsc#1186320).\n- USB: serial: pl2303: fix line-speed handling on newer chips (bsc#1186320).\n- USB: serial: ti_usb_3410_5052: fix TIOCSSERIAL permission check (git-fixes).\n- USB: trancevibrator: fix control-request direction (git-fixes).\n- amdgpu: avoid incorrect %hu format string (git-fixes).\n- arm64/mm: Fix pfn_valid() for ZONE_DEVICE based memory (git-fixes).\n- arm64: Add missing ISB after invalidating TLB in __primary_switch (git-fixes).\n- arm64: avoid -Woverride-init warning (git-fixes).\n- arm64: kasan: fix page_alloc tagging with DEBUG_VIRTUAL (git-fixes).\n- arm64: kdump: update ppos when reading elfcorehdr (git-fixes).\n- arm64: kexec_file: fix memory leakage in create_dtb() when fdt_open_into() fails (git-fixes).\n- arm64: link with -z norelro for LLD or aarch64-elf (git-fixes).\n- arm64: link with -z norelro regardless of CONFIG_RELOCATABLE (git-fixes).\n- arm64: ptrace: Fix seccomp of traced syscall -1 (NO_SYSCALL) (git-fixes).\n- arm64: ptrace: Use NO_SYSCALL instead of -1 in syscall_trace_enter() (git-fixes).\n- arm64: vdso32: make vdso32 install conditional (git-fixes).\n- arm: mm: use __pfn_to_section() to get mem_section (git-fixes).\n- ata: ahci: Disable SXS for Hisilicon Kunpeng920 (git-fixes).\n- blk-iocost: ioc_pd_free() shouldn\u0027t assume irq disabled (git-fixes).\n- blk-mq: Swap two calls in blk_mq_exit_queue() (git-fixes).\n- block/genhd: use atomic_t for disk_event-\u003eblock (bsc#1185497).\n- block: Fix three kernel-doc warnings (git-fixes).\n- block: fix get_max_io_size() (git-fixes).\n- bnxt_en: Fix RX consumer index logic in the error path (git-fixes).\n- bnxt_en: fix ternary sign extension bug in bnxt_show_temp() (git-fixes).\n- bpf: Fix leakage of uninitialized bpf stack under speculation (bsc#1155518).\n- bpf: Fix masking negation logic upon negative dst register (bsc#1155518).\n- btrfs: fix race between transaction aborts and fsyncs leading to use-after-free (bsc#1186441).\n- btrfs: fix race when picking most recent mod log operation for an old root (bsc#1186439).\n- cdc-wdm: untangle a circular dependency between callback and softint (git-fixes).\n- cdrom: gdrom: deallocate struct gdrom_unit fields in remove_gdrom (git-fixes).\n- cdrom: gdrom: initialize global variable at init time (git-fixes).\n- ceph: do not clobber i_snap_caps on non-I_NEW inode (bsc#1186501).\n- ceph: fix inode leak on getattr error in __fh_to_dentry (bsc#1186501).\n- ceph: fix up error handling with snapdirs (bsc#1186501).\n- ceph: only check pool permissions for regular files (bsc#1186501).\n- cfg80211: scan: drop entry from hidden_list on overflow (git-fixes).\n- clk: socfpga: arria10: Fix memory leak of socfpga_clk on error return (git-fixes).\n- cpufreq: intel_pstate: Add Icelake servers support in no-HWP mode (bsc#1185758).\n- crypto: api - check for ERR pointers in crypto_destroy_tfm() (git-fixes).\n- crypto: mips/poly1305 - enable for all MIPS processors (git-fixes).\n- crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init (git-fixes).\n- crypto: qat - Fix a double free in adf_create_ring (git-fixes).\n- crypto: qat - do not release uninitialized resources (git-fixes).\n- crypto: qat - fix error path in adf_isr_resource_alloc() (git-fixes).\n- crypto: qat - fix unmap invalid dma address (git-fixes).\n- crypto: stm32/cryp - Fix PM reference leak on stm32-cryp.c (git-fixes).\n- crypto: stm32/hash - Fix PM reference leak on stm32-hash.c (git-fixes).\n- cxgb4: Fix unintentional sign extension issues (git-fixes).\n- dm: avoid filesystem lookup in dm_get_dev_t() (git-fixes).\n- dmaengine: dw-edma: Fix crash on loading/unloading driver (git-fixes).\n- docs: kernel-parameters: Add gpio_mockup_named_lines (git-fixes).\n- docs: kernel-parameters: Move gpio-mockup for alphabetic order (git-fixes).\n- drivers: hv: Fix whitespace errors (bsc#1185725).\n- drm/amd/display: Fix UBSAN warning for not a valid value for type \u0027_Bool\u0027 (git-fixes).\n- drm/amd/display: Fix two cursor duplication when using overlay (git-fixes).\n- drm/amd/display: Force vsync flip when reconfiguring MPCC (git-fixes).\n- drm/amd/display: Reject non-zero src_y and src_x for video planes (git-fixes).\n- drm/amd/display: fix dml prefetch validation (git-fixes).\n- drm/amd/display: fixed divide by zero kernel crash during dsc enablement (git-fixes).\n- drm/amdgpu : Fix asic reset regression issue introduce by 8f211fe8ac7c4f (git-fixes).\n- drm/amdgpu: disable 3DCGCG on picasso/raven1 to avoid compute hang (git-fixes).\n- drm/amdgpu: fix NULL pointer dereference (git-fixes).\n- drm/amdgpu: mask the xgmi number of hops reported from psp to kfd (git-fixes).\n- drm/amdkfd: Fix cat debugfs hang_hws file causes system crash bug (git-fixes).\n- drm/i915: Avoid div-by-zero on gen2 (git-fixes).\n- drm/meson: fix shutdown crash when component not probed (git-fixes).\n- drm/msm/mdp5: Configure PP_SYNC_HEIGHT to double the vtotal (git-fixes).\n- drm/msm/mdp5: Do not multiply vclk line count by 100 (git-fixes).\n- drm/radeon/dpm: Disable sclk switching on Oland when two 4K 60Hz monitors are connected (git-fixes).\n- drm/radeon: Avoid power table parsing memory leaks (git-fixes).\n- drm/radeon: Fix off-by-one power_state index heap overwrite (git-fixes).\n- drm/vkms: fix misuse of WARN_ON (git-fixes).\n- drm: Added orientation quirk for OneGX1 Pro (git-fixes).\n- ethernet:enic: Fix a use after free bug in enic_hard_start_xmit (git-fixes).\n- extcon: arizona: Fix some issues when HPDET IRQ fires after the jack has been unplugged (git-fixes).\n- extcon: arizona: Fix various races on driver unbind (git-fixes).\n- fbdev: zero-fill colormap in fbcmap.c (git-fixes).\n- firmware: arm_scpi: Prevent the ternary sign expansion bug (git-fixes).\n- fs/epoll: restore waking from ep_done_scan() (bsc#1183868).\n- ftrace: Handle commands when closing set_ftrace_filter file (git-fixes).\n- futex: Change utime parameter to be \u0027const ... *\u0027 (git-fixes).\n- futex: Do not apply time namespace adjustment on FUTEX_LOCK_PI (bsc#1164648).\n- futex: Get rid of the val2 conditional dance (git-fixes).\n- futex: Make syscall entry points less convoluted (git-fixes).\n- genirq/irqdomain: Do not try to free an interrupt that has no (git-fixes)\n- genirq: Disable interrupts for force threaded handlers (git-fixes)\n- genirq: Reduce irqdebug cacheline bouncing (bsc#1185703 ltc#192641).\n- gpio: xilinx: Correct kernel doc for xgpio_probe() (git-fixes).\n- gpiolib: acpi: Add quirk to ignore EC wakeups on Dell Venue 10 Pro 5055 (git-fixes).\n- hrtimer: Update softirq_expires_next correctly after (git-fixes)\n- hwmon: (occ) Fix poll rate limiting (git-fixes).\n- i2c: Add I2C_AQ_NO_REP_START adapter quirk (git-fixes).\n- i2c: bail out early when RDWR parameters are wrong (git-fixes).\n- i2c: i801: Do not generate an interrupt on bus reset (git-fixes).\n- i2c: s3c2410: fix possible NULL pointer deref on read message after write (git-fixes).\n- i2c: sh_mobile: Use new clock calculation formulas for RZ/G2E (git-fixes).\n- i40e: Fix PHY type identifiers for 2.5G and 5G adapters (git-fixes).\n- i40e: Fix use-after-free in i40e_client_subtask() (git-fixes).\n- i40e: fix broken XDP support (git-fixes).\n- i40e: fix the restart auto-negotiation after FEC modified (git-fixes).\n- ibmvfc: Avoid move login if fast fail is enabled (bsc#1185938 ltc#192043).\n- ibmvfc: Handle move login failure (bsc#1185938 ltc#192043).\n- ibmvfc: Reinit target retries (bsc#1185938 ltc#192043).\n- ibmvnic: remove default label from to_string switch (bsc#1152457 ltc#174432 git-fixes).\n- ics932s401: fix broken handling of errors when word reading fails (git-fixes).\n- iio: adc: ad7124: Fix missbalanced regulator enable / disable on error (git-fixes).\n- iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers (git-fixes).\n- iio: adc: ad7768-1: Fix too small buffer passed to iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: ad7793: Add missing error code in ad7793_setup() (git-fixes).\n- iio: gyro: fxas21002c: balance runtime power in error path (git-fixes).\n- iio: gyro: mpu3050: Fix reported temperature value (git-fixes).\n- iio: proximity: pulsedlight: Fix rumtime PM imbalance on error (git-fixes).\n- iio: tsl2583: Fix division by a zero lux_val (git-fixes).\n- intel_th: Consistency and off-by-one fix (git-fixes).\n- iommu/amd: Add support for map/unmap_resource (jsc#ECO-3482).\n- ipc/mqueue, msg, sem: Avoid relying on a stack reference past its expiry (bsc#1185988).\n- ipmi/watchdog: Stop watchdog timer when the current action is \u0027none\u0027 (bsc#1184855).\n- kernel-docs.spec.in: Build using an utf-8 locale. Sphinx cannot handle UTF-8 input in non-UTF-8 locale.\n- leds: lp5523: check return value of lp5xx_read and jump to cleanup code (git-fixes).\n- locking/seqlock: Tweak DEFINE_SEQLOCK() kernel doc (bsc#1176564 bsc#1162702).\n- lpfc: Decouple port_template and vport_template (bsc#185032).\n- mac80211: clear the beacon\u0027s CRC after channel switch (git-fixes).\n- md-cluster: fix use-after-free issue when removing rdev (bsc#1184082).\n- md/raid1: properly indicate failure when ending a failed write request (bsc#1185680).\n- md: do not flush workqueue unconditionally in md_open (bsc#1184081).\n- md: factor out a mddev_find_locked helper from mddev_find (bsc#1184081).\n- md: md_open returns -EBUSY when entering racing area (bsc#1184081).\n- md: split mddev_find (bsc#1184081).\n- media: adv7604: fix possible use-after-free in adv76xx_remove() (git-fixes).\n- media: drivers: media: pci: sta2x11: fix Kconfig dependency on GPIOLIB (git-fixes).\n- media: dvb-usb: fix memory leak in dvb_usb_adapter_init (git-fixes).\n- media: em28xx: fix memory leak (git-fixes).\n- media: gspca/sq905.c: fix uninitialized variable (git-fixes).\n- media: i2c: adv7511-v4l2: fix possible use-after-free in adv7511_remove() (git-fixes).\n- media: i2c: adv7842: fix possible use-after-free in adv7842_remove() (git-fixes).\n- media: i2c: tda1997: Fix possible use-after-free in tda1997x_remove() (git-fixes).\n- media: imx: capture: Return -EPIPE from __capture_legacy_try_fmt() (git-fixes).\n- media: ite-cir: check for receive overflow (git-fixes).\n- media: media/saa7164: fix saa7164_encoder_register() memory leak bugs (git-fixes).\n- media: platform: sti: Fix runtime PM imbalance in regs_show (git-fixes).\n- media: tc358743: fix possible use-after-free in tc358743_remove() (git-fixes).\n- mfd: arizona: Fix rumtime PM imbalance on error (git-fixes).\n- misc/uss720: fix memory leak in uss720_probe (git-fixes).\n- mlxsw: spectrum_mr: Update egress RIF list before route\u0027s action (git-fixes).\n- mm: memcontrol: fix cpuhotplug statistics flushing (bsc#1185606).\n- mmc: block: Update ext_csd.cache_ctrl if it was written (git-fixes).\n- mmc: core: Do a power cycle when the CMD11 fails (git-fixes).\n- mmc: core: Set read only for SD cards with permanent write protect bit (git-fixes).\n- mmc: sdhci-pci-gli: increase 1.8V regulator wait (git-fixes).\n- mmc: sdhci-pci: Add PCI IDs for Intel LKF (git-fixes).\n- mmc: sdhci-pci: Fix initialization of some SD cards for Intel BYT-based controllers (git-fixes).\n- mmc: sdhci: Check for reset prior to DMA address unmap (git-fixes).\n- net, xdp: Update pkt_type if generic XDP changes unicast MAC (git-fixes).\n- net: enetc: fix link error again (git-fixes).\n- net: hns3: Fix for geneve tx checksum bug (git-fixes).\n- net: hns3: add check for HNS3_NIC_STATE_INITED in hns3_reset_notify_up_enet() (git-fixes).\n- net: hns3: clear unnecessary reset request in hclge_reset_rebuild (git-fixes).\n- net: hns3: disable phy loopback setting in hclge_mac_start_phy (git-fixes).\n- net: hns3: fix for vxlan gpe tx checksum bug (git-fixes).\n- net: hns3: fix incorrect configuration for igu_egu_hw_err (git-fixes).\n- net: hns3: initialize the message content in hclge_get_link_mode() (git-fixes).\n- net: hns3: use netif_tx_disable to stop the transmit queue (git-fixes).\n- net: thunderx: Fix unintentional sign extension issue (git-fixes).\n- net: usb: fix memory leak in smsc75xx_bind (git-fixes).\n- net: xfrm: Localize sequence counter per network namespace (bsc#1185696).\n- net: xfrm: Use sequence counter with associated spinlock (bsc#1185696).\n- netdevice: Add missing IFF_PHONY_HEADROOM self-definition (git-fixes).\n- netfilter: conntrack: add new sysctl to disable RST check (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: avoid misleading \u0027invalid\u0027 in log message (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: improve RST handling when tuple is re-used (bsc#1183947 bsc#1185950).\n- nvme-core: add cancel tagset helpers (bsc#1183976).\n- nvme-fabrics: decode host pathing error for connect (bsc#1179827).\n- nvme-fc: check sgl supported by target (bsc#1179827).\n- nvme-fc: clear q_live at beginning of association teardown (bsc#1186479).\n- nvme-fc: return NVME_SC_HOST_ABORTED_CMD when a command has been aborted (bsc#1184259).\n- nvme-fc: set NVME_REQ_CANCELLED in nvme_fc_terminate_exchange() (bsc#1184259).\n- nvme-fc: short-circuit reconnect retries (bsc#1179827).\n- nvme-multipath: fix double initialization of ANA state (bsc#1178612, bsc#1184259).\n- nvme-multipath: reset bdev to ns head when failover (bsc#178378 bsc#1182999).\n- nvme-pci: Remove tag from process cq (git-fixes).\n- nvme-pci: Remove two-pass completions (git-fixes).\n- nvme-pci: Simplify nvme_poll_irqdisable (git-fixes).\n- nvme-pci: align io queue count with allocted nvme_queue in (git-fixes).\n- nvme-pci: avoid race between nvme_reap_pending_cqes() and nvme_poll() (git-fixes).\n- nvme-pci: dma read memory barrier for completions (git-fixes).\n- nvme-pci: fix \u0027slimmer CQ head update\u0027 (git-fixes).\n- nvme-pci: make sure write/poll_queues less or equal then cpu (git-fixes).\n- nvme-pci: remove last_sq_tail (git-fixes).\n- nvme-pci: remove volatile cqes (git-fixes).\n- nvme-pci: slimmer CQ head update (git-fixes).\n- nvme-pci: use simple suspend when a HMB is enabled (git-fixes).\n- nvme-tcp: Fix possible race of io_work and direct send (git-fixes).\n- nvme-tcp: Fix warning with CONFIG_DEBUG_PREEMPT (git-fixes).\n- nvme-tcp: add clean action for failed reconnection (bsc#1183976).\n- nvme-tcp: fix kconfig dependency warning when !CRYPTO (git-fixes).\n- nvme-tcp: fix misuse of __smp_processor_id with preemption (git-fixes).\n- nvme-tcp: fix possible hang waiting for icresp response (bsc#1179519).\n- nvme-tcp: use cancel tagset helper for tear down (bsc#1183976).\n- nvme: Fix NULL dereference for pci nvme controllers (bsc#1182378).\n- nvme: add \u0027kato\u0027 sysfs attribute (bsc#1179825).\n- nvme: add NVME_REQ_CANCELLED flag in nvme_cancel_request() (bsc#1184259).\n- nvme: define constants for identification values (git-fixes).\n- nvme: do not intialize hwmon for discovery controllers (bsc#1184259).\n- nvme: do not intialize hwmon for discovery controllers (git-fixes).\n- nvme: document nvme controller states (git-fixes).\n- nvme: explicitly update mpath disk capacity on revalidation (git-fixes).\n- nvme: expose reconnect_delay and ctrl_loss_tmo via sysfs (bsc#1182378).\n- nvme: fix controller instance leak (git-fixes).\n- nvme: fix deadlock in disconnect during scan_work and/or ana_work (git-fixes).\n- nvme: fix possible deadlock when I/O is blocked (git-fixes).\n- nvme: remove superfluous else in nvme_ctrl_loss_tmo_store (bsc#1182378).\n- nvme: retrigger ANA log update if group descriptor isn\u0027t found (git-fixes)\n- nvme: sanitize KATO setting (bsc#1179825).\n- nvme: simplify error logic in nvme_validate_ns() (bsc#1184259).\n- nvmet: fix a memory leak (git-fixes).\n- nvmet: seset ns-\u003efile when open fails (bsc#1183873).\n- nvmet: use new ana_log_size instead the old one (bsc#1184259).\n- nxp-i2c: restore includes for kABI (bsc#1185589).\n- nxp-nci: add NXP1002 id (bsc#1185589).\n- phy: phy-twl4030-usb: Fix possible use-after-free in twl4030_usb_remove() (git-fixes).\n- pinctrl: ingenic: Improve unreachable code generation (git-fixes).\n- pinctrl: samsung: use \u0027int\u0027 for register masks in Exynos (git-fixes).\n- platform/mellanox: mlxbf-tmfifo: Fix a memory barrier issue (git-fixes).\n- platform/x86: intel_pmc_core: Do not use global pmcdev in quirks (git-fixes).\n- platform/x86: thinkpad_acpi: Correct thermal sensor allocation (git-fixes).\n- posix-timers: Preserve return value in clock_adjtime32() (git-fixes)\n- power: supply: Use IRQF_ONESHOT (git-fixes).\n- power: supply: generic-adc-battery: fix possible use-after-free in gab_remove() (git-fixes).\n- power: supply: s3c_adc_battery: fix possible use-after-free in s3c_adc_bat_remove() (git-fixes).\n- powerpc/64s: Fix crashes when toggling entry flush barrier (bsc#1177666 git-fixes).\n- powerpc/64s: Fix crashes when toggling stf barrier (bsc#1087082 git-fixes).\n- qtnfmac: Fix possible buffer overflow in qtnf_event_handle_external_auth (git-fixes).\n- rtc: pcf2127: handle timestamp interrupts (bsc#1185495).\n- s390/dasd: fix hanging DASD driver unbind (bsc#1183932 LTC#192153).\n- s390/entry: save the caller of psw_idle (bsc#1185677).\n- s390/kdump: fix out-of-memory with PCI (bsc#1182257 LTC#191375).\n- sched/eas: Do not update misfit status if the task is pinned (git-fixes)\n- sched/fair: Avoid stale CPU util_est value for schedutil in (git-fixes)\n- sched/fair: Fix unfairness caused by missing load decay (git-fixes)\n- scripts/git_sort/git_sort.py: add bpf git repo\n- scsi: core: Run queue in case of I/O resource contention failure (bsc#1186416).\n- scsi: fnic: Kill \u0027exclude_id\u0027 argument to fnic_cleanup_io() (bsc#1179851).\n- scsi: libfc: Avoid invoking response handler twice if ep is already completed (bsc#1186573).\n- scsi: lpfc: Add a option to enable interlocked ABTS before job completion (bsc#1186451).\n- scsi: lpfc: Add ndlp kref accounting for resume RPI path (bsc#1186451).\n- scsi: lpfc: Fix \u0027Unexpected timeout\u0027 error in direct attach topology (bsc#1186451).\n- scsi: lpfc: Fix Node recovery when driver is handling simultaneous PLOGIs (bsc#1186451).\n- scsi: lpfc: Fix bad memory access during VPD DUMP mailbox command (bsc#1186451).\n- scsi: lpfc: Fix crash when lpfc_sli4_hba_setup() fails to initialize the SGLs (bsc#1186451).\n- scsi: lpfc: Fix node handling for Fabric Controller and Domain Controller (bsc#1186451).\n- scsi: lpfc: Fix non-optimized ERSP handling (bsc#1186451).\n- scsi: lpfc: Fix unreleased RPIs when NPIV ports are created (bsc#1186451).\n- scsi: lpfc: Ignore GID-FT response that may be received after a link flip (bsc#1186451).\n- scsi: lpfc: Reregister FPIN types if ELS_RDF is received from fabric controller (bsc#1186451).\n- scsi: lpfc: Update lpfc version to 12.8.0.10 (bsc#1186451).\n- sctp: delay auto_asconf init until binding the first addr\n- seqlock,lockdep: Fix seqcount_latch_init() (bsc#1176564 bsc#1162702).\n- serial: core: fix suspicious security_locked_down() call (git-fixes).\n- serial: core: return early on unsupported ioctls (git-fixes).\n- serial: sh-sci: Fix off-by-one error in FIFO threshold register setting (git-fixes).\n- serial: stm32: fix incorrect characters on console (git-fixes).\n- serial: stm32: fix tx_empty condition (git-fixes).\n- serial: tegra: Fix a mask operation that is always true (git-fixes).\n- smc: disallow TCP_ULP in smc_setsockopt() (git-fixes).\n- spi: ath79: always call chipselect function (git-fixes).\n- spi: ath79: remove spi-master setup and cleanup assignment (git-fixes).\n- spi: dln2: Fix reference leak to master (git-fixes).\n- spi: omap-100k: Fix reference leak to master (git-fixes).\n- spi: qup: fix PM reference leak in spi_qup_remove() (git-fixes).\n- spi: spi-fsl-dspi: Fix a resource leak in an error handling path (git-fixes).\n- staging: emxx_udc: fix loop in _nbu2ss_nuke() (git-fixes).\n- staging: iio: cdc: ad7746: avoid overwrite of num_channels (git-fixes).\n- tcp: fix to update snd_wl1 in bulk receiver fast path\n- thermal/drivers/ti-soc-thermal/bandgap Remove unused variable \u0027val\u0027 (git-fixes).\n- thunderbolt: dma_port: Fix NVM read buffer bounds and offset issue (git-fixes).\n- tracing: Map all PIDs to command lines (git-fixes).\n- tty: amiserial: fix TIOCSSERIAL permission check (git-fixes).\n- tty: fix memory leak in vc_deallocate (git-fixes).\n- tty: moxa: fix TIOCSSERIAL jiffies conversions (git-fixes).\n- tty: moxa: fix TIOCSSERIAL permission check (git-fixes).\n- uio: uio_hv_generic: use devm_kzalloc() for private data alloc (git-fixes).\n- uio_hv_generic: Fix a memory leak in error handling paths (git-fixes).\n- uio_hv_generic: Fix another memory leak in error handling paths (git-fixes).\n- uio_hv_generic: add missed sysfs_remove_bin_file (git-fixes).\n- usb: core: hub: Fix PM reference leak in usb_port_resume() (git-fixes).\n- usb: core: hub: fix race condition about TRSMRCY of resume (git-fixes).\n- usb: dwc2: Fix gadget DMA unmap direction (git-fixes).\n- usb: dwc3: gadget: Enable suspend events (git-fixes).\n- usb: dwc3: gadget: Return success always for kick transfer in ep queue (git-fixes).\n- usb: dwc3: omap: improve extcon initialization (git-fixes).\n- usb: dwc3: pci: Enable usb2-gadget-lpm-disable for Intel Merrifield (git-fixes).\n- usb: fotg210-hcd: Fix an error message (git-fixes).\n- usb: gadget/function/f_fs string table fix for multiple languages (git-fixes).\n- usb: gadget: dummy_hcd: fix gpf in gadget_setup (git-fixes).\n- usb: gadget: f_uac1: validate input parameters (git-fixes).\n- usb: gadget: f_uac2: validate input parameters (git-fixes).\n- usb: gadget: udc: renesas_usb3: Fix a race in usb3_start_pipen() (git-fixes).\n- usb: gadget: uvc: add bInterval checking for HS mode (git-fixes).\n- usb: musb: fix PM reference leak in musb_irq_work() (git-fixes).\n- usb: sl811-hcd: improve misleading indentation (git-fixes).\n- usb: webcam: Invalid size of Processing Unit Descriptor (git-fixes).\n- usb: xhci: Fix port minor revision (git-fixes).\n- usb: xhci: Increase timeout for HC halt (git-fixes).\n- vgacon: Record video mode changes with VT_RESIZEX (git-fixes).\n- video: hyperv_fb: Add ratelimit on error message (bsc#1185725).\n- vrf: fix a comment about loopback device (git-fixes).\n- watchdog/softlockup: Remove obsolete check of last reported task (bsc#1185982).\n- watchdog/softlockup: report the overall time of softlockups (bsc#1185982).\n- watchdog: explicitly update timestamp when reporting softlockup (bsc#1185982).\n- watchdog: rename __touch_watchdog() to a better descriptive name (bsc#1185982).\n- whitespace cleanup\n- wl3501_cs: Fix out-of-bounds warnings in wl3501_mgmt_join (git-fixes).\n- wl3501_cs: Fix out-of-bounds warnings in wl3501_send_pkt (git-fixes).\n- workqueue: Minor follow-ups to the rescuer destruction change (bsc#1185911).\n- workqueue: more destroy_workqueue() fixes (bsc#1185911).\n- x86/cpu: Initialize MSR_TSC_AUX if RDTSCP *or* RDPID is supported (bsc#1152489).\n- xhci: Do not use GFP_KERNEL in (potentially) atomic context (git-fixes).\n- xhci: check control context is valid before dereferencing it (git-fixes).\n- xhci: fix potential array out of bounds with several interrupters (git-fixes).\n- xsk: Respect device\u0027s headroom and tailroom on generic xmit path (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2208,SUSE-SLE-Module-RT-15-SP3-2021-2208,SUSE-SUSE-MicroOS-5.0-2021-2208",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2208-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2208-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212208-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2208-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/009103.html"
},
{
"category": "self",
"summary": "SUSE Bug 1087082",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "self",
"summary": "SUSE Bug 1133021",
"url": "https://bugzilla.suse.com/1133021"
},
{
"category": "self",
"summary": "SUSE Bug 1152457",
"url": "https://bugzilla.suse.com/1152457"
},
{
"category": "self",
"summary": "SUSE Bug 1152489",
"url": "https://bugzilla.suse.com/1152489"
},
{
"category": "self",
"summary": "SUSE Bug 1155518",
"url": "https://bugzilla.suse.com/1155518"
},
{
"category": "self",
"summary": "SUSE Bug 1156395",
"url": "https://bugzilla.suse.com/1156395"
},
{
"category": "self",
"summary": "SUSE Bug 1162702",
"url": "https://bugzilla.suse.com/1162702"
},
{
"category": "self",
"summary": "SUSE Bug 1164648",
"url": "https://bugzilla.suse.com/1164648"
},
{
"category": "self",
"summary": "SUSE Bug 1176564",
"url": "https://bugzilla.suse.com/1176564"
},
{
"category": "self",
"summary": "SUSE Bug 1177666",
"url": "https://bugzilla.suse.com/1177666"
},
{
"category": "self",
"summary": "SUSE Bug 1178418",
"url": "https://bugzilla.suse.com/1178418"
},
{
"category": "self",
"summary": "SUSE Bug 1178612",
"url": "https://bugzilla.suse.com/1178612"
},
{
"category": "self",
"summary": "SUSE Bug 1179827",
"url": "https://bugzilla.suse.com/1179827"
},
{
"category": "self",
"summary": "SUSE Bug 1179851",
"url": "https://bugzilla.suse.com/1179851"
},
{
"category": "self",
"summary": "SUSE Bug 1182378",
"url": "https://bugzilla.suse.com/1182378"
},
{
"category": "self",
"summary": "SUSE Bug 1182999",
"url": "https://bugzilla.suse.com/1182999"
},
{
"category": "self",
"summary": "SUSE Bug 1183346",
"url": "https://bugzilla.suse.com/1183346"
},
{
"category": "self",
"summary": "SUSE Bug 1183868",
"url": "https://bugzilla.suse.com/1183868"
},
{
"category": "self",
"summary": "SUSE Bug 1183873",
"url": "https://bugzilla.suse.com/1183873"
},
{
"category": "self",
"summary": "SUSE Bug 1183932",
"url": "https://bugzilla.suse.com/1183932"
},
{
"category": "self",
"summary": "SUSE Bug 1183947",
"url": "https://bugzilla.suse.com/1183947"
},
{
"category": "self",
"summary": "SUSE Bug 1184081",
"url": "https://bugzilla.suse.com/1184081"
},
{
"category": "self",
"summary": "SUSE Bug 1184082",
"url": "https://bugzilla.suse.com/1184082"
},
{
"category": "self",
"summary": "SUSE Bug 1184611",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "self",
"summary": "SUSE Bug 1184855",
"url": "https://bugzilla.suse.com/1184855"
},
{
"category": "self",
"summary": "SUSE Bug 1185428",
"url": "https://bugzilla.suse.com/1185428"
},
{
"category": "self",
"summary": "SUSE Bug 1185497",
"url": "https://bugzilla.suse.com/1185497"
},
{
"category": "self",
"summary": "SUSE Bug 1185589",
"url": "https://bugzilla.suse.com/1185589"
},
{
"category": "self",
"summary": "SUSE Bug 1185606",
"url": "https://bugzilla.suse.com/1185606"
},
{
"category": "self",
"summary": "SUSE Bug 1185645",
"url": "https://bugzilla.suse.com/1185645"
},
{
"category": "self",
"summary": "SUSE Bug 1185677",
"url": "https://bugzilla.suse.com/1185677"
},
{
"category": "self",
"summary": "SUSE Bug 1185680",
"url": "https://bugzilla.suse.com/1185680"
},
{
"category": "self",
"summary": "SUSE Bug 1185696",
"url": "https://bugzilla.suse.com/1185696"
},
{
"category": "self",
"summary": "SUSE Bug 1185703",
"url": "https://bugzilla.suse.com/1185703"
},
{
"category": "self",
"summary": "SUSE Bug 1185725",
"url": "https://bugzilla.suse.com/1185725"
},
{
"category": "self",
"summary": "SUSE Bug 1185758",
"url": "https://bugzilla.suse.com/1185758"
},
{
"category": "self",
"summary": "SUSE Bug 1185859",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "self",
"summary": "SUSE Bug 1185861",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "self",
"summary": "SUSE Bug 1185863",
"url": "https://bugzilla.suse.com/1185863"
},
{
"category": "self",
"summary": "SUSE Bug 1185898",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "self",
"summary": "SUSE Bug 1185899",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "self",
"summary": "SUSE Bug 1185911",
"url": "https://bugzilla.suse.com/1185911"
},
{
"category": "self",
"summary": "SUSE Bug 1185938",
"url": "https://bugzilla.suse.com/1185938"
},
{
"category": "self",
"summary": "SUSE Bug 1185987",
"url": "https://bugzilla.suse.com/1185987"
},
{
"category": "self",
"summary": "SUSE Bug 1185988",
"url": "https://bugzilla.suse.com/1185988"
},
{
"category": "self",
"summary": "SUSE Bug 1186061",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "self",
"summary": "SUSE Bug 1186285",
"url": "https://bugzilla.suse.com/1186285"
},
{
"category": "self",
"summary": "SUSE Bug 1186320",
"url": "https://bugzilla.suse.com/1186320"
},
{
"category": "self",
"summary": "SUSE Bug 1186439",
"url": "https://bugzilla.suse.com/1186439"
},
{
"category": "self",
"summary": "SUSE Bug 1186441",
"url": "https://bugzilla.suse.com/1186441"
},
{
"category": "self",
"summary": "SUSE Bug 1186460",
"url": "https://bugzilla.suse.com/1186460"
},
{
"category": "self",
"summary": "SUSE Bug 1186498",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "self",
"summary": "SUSE Bug 1186501",
"url": "https://bugzilla.suse.com/1186501"
},
{
"category": "self",
"summary": "SUSE Bug 1186573",
"url": "https://bugzilla.suse.com/1186573"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24586 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24587 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24587/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24588 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26139 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26141 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26145 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26145/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26147 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23134 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32399 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33034 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33034/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33200 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3491 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3491/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-06-30T07:49:49Z",
"generator": {
"date": "2021-06-30T07:49:49Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2208-1",
"initial_release_date": "2021-06-30T07:49:49Z",
"revision_history": [
{
"date": "2021-06-30T07:49:49Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-rt-5.3.18-8.13.1.noarch",
"product": {
"name": "kernel-devel-rt-5.3.18-8.13.1.noarch",
"product_id": "kernel-devel-rt-5.3.18-8.13.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-rt-5.3.18-8.13.1.noarch",
"product": {
"name": "kernel-source-rt-5.3.18-8.13.1.noarch",
"product_id": "kernel-source-rt-5.3.18-8.13.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"product_id": "cluster-md-kmp-rt-5.3.18-8.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-rt_debug-5.3.18-8.13.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt_debug-5.3.18-8.13.1.x86_64",
"product_id": "cluster-md-kmp-rt_debug-5.3.18-8.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"product": {
"name": "dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"product_id": "dlm-kmp-rt-5.3.18-8.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt_debug-5.3.18-8.13.1.x86_64",
"product": {
"name": "dlm-kmp-rt_debug-5.3.18-8.13.1.x86_64",
"product_id": "dlm-kmp-rt_debug-5.3.18-8.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"product": {
"name": "gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"product_id": "gfs2-kmp-rt-5.3.18-8.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt_debug-5.3.18-8.13.1.x86_64",
"product": {
"name": "gfs2-kmp-rt_debug-5.3.18-8.13.1.x86_64",
"product_id": "gfs2-kmp-rt_debug-5.3.18-8.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-5.3.18-8.13.1.x86_64",
"product": {
"name": "kernel-rt-5.3.18-8.13.1.x86_64",
"product_id": "kernel-rt-5.3.18-8.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-5.3.18-8.13.1.x86_64",
"product": {
"name": "kernel-rt-devel-5.3.18-8.13.1.x86_64",
"product_id": "kernel-rt-devel-5.3.18-8.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-extra-5.3.18-8.13.1.x86_64",
"product": {
"name": "kernel-rt-extra-5.3.18-8.13.1.x86_64",
"product_id": "kernel-rt-extra-5.3.18-8.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-livepatch-devel-5.3.18-8.13.1.x86_64",
"product": {
"name": "kernel-rt-livepatch-devel-5.3.18-8.13.1.x86_64",
"product_id": "kernel-rt-livepatch-devel-5.3.18-8.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-5.3.18-8.13.1.x86_64",
"product": {
"name": "kernel-rt_debug-5.3.18-8.13.1.x86_64",
"product_id": "kernel-rt_debug-5.3.18-8.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"product": {
"name": "kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"product_id": "kernel-rt_debug-devel-5.3.18-8.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-extra-5.3.18-8.13.1.x86_64",
"product": {
"name": "kernel-rt_debug-extra-5.3.18-8.13.1.x86_64",
"product_id": "kernel-rt_debug-extra-5.3.18-8.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-livepatch-devel-5.3.18-8.13.1.x86_64",
"product": {
"name": "kernel-rt_debug-livepatch-devel-5.3.18-8.13.1.x86_64",
"product_id": "kernel-rt_debug-livepatch-devel-5.3.18-8.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-rt-5.3.18-8.13.1.x86_64",
"product": {
"name": "kernel-syms-rt-5.3.18-8.13.1.x86_64",
"product_id": "kernel-syms-rt-5.3.18-8.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt-5.3.18-8.13.1.x86_64",
"product": {
"name": "kselftests-kmp-rt-5.3.18-8.13.1.x86_64",
"product_id": "kselftests-kmp-rt-5.3.18-8.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt_debug-5.3.18-8.13.1.x86_64",
"product": {
"name": "kselftests-kmp-rt_debug-5.3.18-8.13.1.x86_64",
"product_id": "kselftests-kmp-rt_debug-5.3.18-8.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"product_id": "ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt_debug-5.3.18-8.13.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt_debug-5.3.18-8.13.1.x86_64",
"product_id": "ocfs2-kmp-rt_debug-5.3.18-8.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-rt-5.3.18-8.13.1.x86_64",
"product": {
"name": "reiserfs-kmp-rt-5.3.18-8.13.1.x86_64",
"product_id": "reiserfs-kmp-rt-5.3.18-8.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-rt_debug-5.3.18-8.13.1.x86_64",
"product": {
"name": "reiserfs-kmp-rt_debug-5.3.18-8.13.1.x86_64",
"product_id": "reiserfs-kmp-rt_debug-5.3.18-8.13.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Real Time Module 15 SP3",
"product": {
"name": "SUSE Real Time Module 15 SP3",
"product_id": "SUSE Real Time Module 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-rt:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.0",
"product": {
"name": "SUSE Linux Enterprise Micro 5.0",
"product_id": "SUSE Linux Enterprise Micro 5.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-rt-5.3.18-8.13.1.x86_64 as component of SUSE Real Time Module 15 SP3",
"product_id": "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64"
},
"product_reference": "cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-rt-5.3.18-8.13.1.x86_64 as component of SUSE Real Time Module 15 SP3",
"product_id": "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64"
},
"product_reference": "dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-rt-5.3.18-8.13.1.x86_64 as component of SUSE Real Time Module 15 SP3",
"product_id": "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64"
},
"product_reference": "gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-rt-5.3.18-8.13.1.noarch as component of SUSE Real Time Module 15 SP3",
"product_id": "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch"
},
"product_reference": "kernel-devel-rt-5.3.18-8.13.1.noarch",
"relates_to_product_reference": "SUSE Real Time Module 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-5.3.18-8.13.1.x86_64 as component of SUSE Real Time Module 15 SP3",
"product_id": "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64"
},
"product_reference": "kernel-rt-5.3.18-8.13.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-5.3.18-8.13.1.x86_64 as component of SUSE Real Time Module 15 SP3",
"product_id": "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64"
},
"product_reference": "kernel-rt-devel-5.3.18-8.13.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-devel-5.3.18-8.13.1.x86_64 as component of SUSE Real Time Module 15 SP3",
"product_id": "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64"
},
"product_reference": "kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-5.3.18-8.13.1.noarch as component of SUSE Real Time Module 15 SP3",
"product_id": "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch"
},
"product_reference": "kernel-source-rt-5.3.18-8.13.1.noarch",
"relates_to_product_reference": "SUSE Real Time Module 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-rt-5.3.18-8.13.1.x86_64 as component of SUSE Real Time Module 15 SP3",
"product_id": "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64"
},
"product_reference": "kernel-syms-rt-5.3.18-8.13.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-rt-5.3.18-8.13.1.x86_64 as component of SUSE Real Time Module 15 SP3",
"product_id": "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
},
"product_reference": "ocfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-5.3.18-8.13.1.x86_64 as component of SUSE Linux Enterprise Micro 5.0",
"product_id": "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64"
},
"product_reference": "kernel-rt-5.3.18-8.13.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-24586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24586"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24586",
"url": "https://www.suse.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-30T07:49:49Z",
"details": "moderate"
}
],
"title": "CVE-2020-24586"
},
{
"cve": "CVE-2020-24587",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24587"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24587",
"url": "https://www.suse.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1185862 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-30T07:49:49Z",
"details": "moderate"
}
],
"title": "CVE-2020-24587"
},
{
"cve": "CVE-2020-24588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24588"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24588",
"url": "https://www.suse.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "SUSE Bug 1185861 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1192868"
},
{
"category": "external",
"summary": "SUSE Bug 1199701 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1199701"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-30T07:49:49Z",
"details": "moderate"
}
],
"title": "CVE-2020-24588"
},
{
"cve": "CVE-2020-26139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26139"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26139",
"url": "https://www.suse.com/security/cve/CVE-2020-26139"
},
{
"category": "external",
"summary": "SUSE Bug 1186062 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-30T07:49:49Z",
"details": "moderate"
}
],
"title": "CVE-2020-26139"
},
{
"cve": "CVE-2020-26141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26141"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26141",
"url": "https://www.suse.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "SUSE Bug 1185987 for CVE-2020-26141",
"url": "https://bugzilla.suse.com/1185987"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-30T07:49:49Z",
"details": "moderate"
}
],
"title": "CVE-2020-26141"
},
{
"cve": "CVE-2020-26145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26145"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26145",
"url": "https://www.suse.com/security/cve/CVE-2020-26145"
},
{
"category": "external",
"summary": "SUSE Bug 1185860 for CVE-2020-26145",
"url": "https://bugzilla.suse.com/1185860"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-30T07:49:49Z",
"details": "moderate"
}
],
"title": "CVE-2020-26145"
},
{
"cve": "CVE-2020-26147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26147"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26147",
"url": "https://www.suse.com/security/cve/CVE-2020-26147"
},
{
"category": "external",
"summary": "SUSE Bug 1233723 for CVE-2020-26147",
"url": "https://bugzilla.suse.com/1233723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-30T07:49:49Z",
"details": "moderate"
}
],
"title": "CVE-2020-26147"
},
{
"cve": "CVE-2021-23134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23134"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23134",
"url": "https://www.suse.com/security/cve/CVE-2021-23134"
},
{
"category": "external",
"summary": "SUSE Bug 1186060 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "external",
"summary": "SUSE Bug 1186061 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "external",
"summary": "SUSE Bug 1220739 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1220739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-30T07:49:49Z",
"details": "important"
}
],
"title": "CVE-2021-23134"
},
{
"cve": "CVE-2021-32399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32399"
}
],
"notes": [
{
"category": "general",
"text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32399",
"url": "https://www.suse.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "SUSE Bug 1184611 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "external",
"summary": "SUSE Bug 1185898 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "external",
"summary": "SUSE Bug 1185899 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-30T07:49:49Z",
"details": "important"
}
],
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-33034",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33034"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33034",
"url": "https://www.suse.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "SUSE Bug 1186111 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "external",
"summary": "SUSE Bug 1186285 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-30T07:49:49Z",
"details": "important"
}
],
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-33200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33200"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-\u003ealu_limit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33200",
"url": "https://www.suse.com/security/cve/CVE-2021-33200"
},
{
"category": "external",
"summary": "SUSE Bug 1186484 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "external",
"summary": "SUSE Bug 1186498 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-30T07:49:49Z",
"details": "important"
}
],
"title": "CVE-2021-33200"
},
{
"cve": "CVE-2021-3491",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3491"
}
],
"notes": [
{
"category": "general",
"text": "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3491",
"url": "https://www.suse.com/security/cve/CVE-2021-3491"
},
{
"category": "external",
"summary": "SUSE Bug 1185642 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "external",
"summary": "SUSE Bug 1187090 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1187090"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-30T07:49:49Z",
"details": "important"
}
],
"title": "CVE-2021-3491"
}
]
}
suse-su-2021:2406-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)\n- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to obtain full root privileges. (bsc#1188062)\n- CVE-2021-3609: Fixed a race condition in the CAN BCM networking protocol which allows for local privilege escalation. (bsc#1187215)\n- CVE-2021-0605: Fixed an out-of-bounds read which could lead to local information disclosure in the kernel with System execution privileges needed. (bsc#1187601)\n- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187595)\n- CVE-2021-34693: Fixed a bug in net/can/bcm.c which could allow local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized. (bsc#1187452)\n- CVE-2020-36385: Fixed a use-after-free flaw in ucma.c which allows for local privilege escalation. (bsc#1187050)\n- CVE-2021-0129: Fixed an improper access control in BlueZ that may have allowed an authenticated user to potentially enable information disclosure via adjacent access. (bsc#1186463)\n- CVE-2020-26558: Fixed a flaw in the Bluetooth LE and BR/EDR secure pairing that could permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing. (bsc#1179610)\n- CVE-2020-36386: Fixed an out-of-bounds read in hci_extended_inquiry_result_evt. (bsc#1187038)\n- CVE-2020-24588: Fixed a bug that could allow an adversary to abuse devices that support receiving non-SSP A-MSDU frames to inject arbitrary network packets. (bsc#1185861)\n- CVE-2021-32399: Fixed a race condition in net/bluetooth/hci_request.c for removal of the HCI controller. (bsc#1184611)\n- CVE-2021-33034: Fixed an issue in net/bluetooth/hci_event.c where a use-after-free leads to writing an arbitrary value. (bsc#1186111)\n- CVE-2020-26139: Fixed a bug that allows an Access Point (AP) to forward EAPOL frames to other clients even though the sender has not yet successfully authenticated. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and made it easier to exploit other vulnerabilities in connected clients. (bsc#1186062)\n- CVE-2021-23134: Fixed a use After Free vulnerability in nfc sockets which allows local attackers to elevate their privileges. (bsc#1186060)\n- CVE-2020-24586: Fixed a bug that, under the right circumstances, allows to inject arbitrary network packets and/or exfiltrate user data when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP. (bsc#1185859)\n- CVE-2020-26141: Fixed a flaw that could allows an adversary to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bsc#1185987)\n- CVE-2020-26145: Fixed a bug in the WEP, WPA, WPA2, and WPA3 implementations that could allows an adversary to inject arbitrary network packets. (bsc#1185860)\n- CVE-2020-24587: Fixed a bug that allows an adversary to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed. (bsc#1185862)\n- CVE-2020-26147: Fixed a bug in the WEP, WPA, WPA2, and WPA3 implementations that could allows an adversary to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames. (bsc#1185987)\n\nThe following non-security bugs were fixed:\n\n- kABI: Fix kABI after modifying struct __call_single_data (bsc#1180846).\n- kernel/smp: add boot parameter for controlling CSD lock debugging (bsc#1180846).\n- kernel/smp: Add source and destination CPUs to __call_single_data (bsc#1180846).\n- kernel/smp: make csdlock timeout depend on boot parameter (bsc#1180846).\n- kernel/smp: Provide CSD lock timeout diagnostics (bsc#1180846).\n- Update config files: activate CONFIG_CSD_LOCK_WAIT_DEBUG for x86 (bsc#1180846).\n- Update config files: disable CONFIG_CSD_LOCK_WAIT_DEBUG (bsc#1180846).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2406,SUSE-SLE-SERVER-12-SP2-BCL-2021-2406",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2406-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2406-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212406-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2406-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html"
},
{
"category": "self",
"summary": "SUSE Bug 1179610",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "self",
"summary": "SUSE Bug 1180846",
"url": "https://bugzilla.suse.com/1180846"
},
{
"category": "self",
"summary": "SUSE Bug 1184611",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "self",
"summary": "SUSE Bug 1185859",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "self",
"summary": "SUSE Bug 1185860",
"url": "https://bugzilla.suse.com/1185860"
},
{
"category": "self",
"summary": "SUSE Bug 1185861",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "self",
"summary": "SUSE Bug 1185862",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "self",
"summary": "SUSE Bug 1185863",
"url": "https://bugzilla.suse.com/1185863"
},
{
"category": "self",
"summary": "SUSE Bug 1185898",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "self",
"summary": "SUSE Bug 1185987",
"url": "https://bugzilla.suse.com/1185987"
},
{
"category": "self",
"summary": "SUSE Bug 1186060",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "self",
"summary": "SUSE Bug 1186062",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "self",
"summary": "SUSE Bug 1186111",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "self",
"summary": "SUSE Bug 1186390",
"url": "https://bugzilla.suse.com/1186390"
},
{
"category": "self",
"summary": "SUSE Bug 1186463",
"url": "https://bugzilla.suse.com/1186463"
},
{
"category": "self",
"summary": "SUSE Bug 1187038",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "self",
"summary": "SUSE Bug 1187050",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "self",
"summary": "SUSE Bug 1187215",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "self",
"summary": "SUSE Bug 1187452",
"url": "https://bugzilla.suse.com/1187452"
},
{
"category": "self",
"summary": "SUSE Bug 1187595",
"url": "https://bugzilla.suse.com/1187595"
},
{
"category": "self",
"summary": "SUSE Bug 1187601",
"url": "https://bugzilla.suse.com/1187601"
},
{
"category": "self",
"summary": "SUSE Bug 1187934",
"url": "https://bugzilla.suse.com/1187934"
},
{
"category": "self",
"summary": "SUSE Bug 1188062",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "self",
"summary": "SUSE Bug 1188116",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24586 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24587 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24587/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24588 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26139 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26141 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26145 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26145/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26147 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26558 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36385 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36386 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36386/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0129 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0512 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0512/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0605 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0605/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22555 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23134 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32399 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33034 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33034/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-34693 page",
"url": "https://www.suse.com/security/cve/CVE-2021-34693/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3609 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3609/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-07-20T12:40:03Z",
"generator": {
"date": "2021-07-20T12:40:03Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2406-1",
"initial_release_date": "2021-07-20T12:40:03Z",
"revision_history": [
{
"date": "2021-07-20T12:40:03Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.121-92.158.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.4.121-92.158.1.aarch64",
"product_id": "cluster-md-kmp-default-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-vanilla-4.4.121-92.158.1.aarch64",
"product": {
"name": "cluster-md-kmp-vanilla-4.4.121-92.158.1.aarch64",
"product_id": "cluster-md-kmp-vanilla-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-default-4.4.121-92.158.1.aarch64",
"product": {
"name": "cluster-network-kmp-default-4.4.121-92.158.1.aarch64",
"product_id": "cluster-network-kmp-default-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-vanilla-4.4.121-92.158.1.aarch64",
"product": {
"name": "cluster-network-kmp-vanilla-4.4.121-92.158.1.aarch64",
"product_id": "cluster-network-kmp-vanilla-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.121-92.158.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.4.121-92.158.1.aarch64",
"product_id": "dlm-kmp-default-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-vanilla-4.4.121-92.158.1.aarch64",
"product": {
"name": "dlm-kmp-vanilla-4.4.121-92.158.1.aarch64",
"product_id": "dlm-kmp-vanilla-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.121-92.158.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.4.121-92.158.1.aarch64",
"product_id": "gfs2-kmp-default-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-vanilla-4.4.121-92.158.1.aarch64",
"product": {
"name": "gfs2-kmp-vanilla-4.4.121-92.158.1.aarch64",
"product_id": "gfs2-kmp-vanilla-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.121-92.158.1.aarch64",
"product": {
"name": "kernel-default-4.4.121-92.158.1.aarch64",
"product_id": "kernel-default-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.121-92.158.1.aarch64",
"product": {
"name": "kernel-default-base-4.4.121-92.158.1.aarch64",
"product_id": "kernel-default-base-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.121-92.158.1.aarch64",
"product": {
"name": "kernel-default-devel-4.4.121-92.158.1.aarch64",
"product_id": "kernel-default-devel-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.121-92.158.1.aarch64",
"product": {
"name": "kernel-default-extra-4.4.121-92.158.1.aarch64",
"product_id": "kernel-default-extra-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.121-92.158.1.aarch64",
"product": {
"name": "kernel-default-kgraft-4.4.121-92.158.1.aarch64",
"product_id": "kernel-default-kgraft-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.121-92.158.1.aarch64",
"product": {
"name": "kernel-obs-build-4.4.121-92.158.1.aarch64",
"product_id": "kernel-obs-build-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.121-92.158.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.4.121-92.158.1.aarch64",
"product_id": "kernel-obs-qa-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.121-92.158.1.aarch64",
"product": {
"name": "kernel-syms-4.4.121-92.158.1.aarch64",
"product_id": "kernel-syms-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.121-92.158.1.aarch64",
"product": {
"name": "kernel-vanilla-4.4.121-92.158.1.aarch64",
"product_id": "kernel-vanilla-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.121-92.158.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.4.121-92.158.1.aarch64",
"product_id": "kernel-vanilla-base-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.121-92.158.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.4.121-92.158.1.aarch64",
"product_id": "kernel-vanilla-devel-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.121-92.158.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.4.121-92.158.1.aarch64",
"product_id": "ocfs2-kmp-default-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-vanilla-4.4.121-92.158.1.aarch64",
"product": {
"name": "ocfs2-kmp-vanilla-4.4.121-92.158.1.aarch64",
"product_id": "ocfs2-kmp-vanilla-4.4.121-92.158.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.4.121-92.158.1.noarch",
"product": {
"name": "kernel-devel-4.4.121-92.158.1.noarch",
"product_id": "kernel-devel-4.4.121-92.158.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.4.121-92.158.1.noarch",
"product": {
"name": "kernel-docs-4.4.121-92.158.1.noarch",
"product_id": "kernel-docs-4.4.121-92.158.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.4.121-92.158.1.noarch",
"product": {
"name": "kernel-docs-html-4.4.121-92.158.1.noarch",
"product_id": "kernel-docs-html-4.4.121-92.158.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-pdf-4.4.121-92.158.1.noarch",
"product": {
"name": "kernel-docs-pdf-4.4.121-92.158.1.noarch",
"product_id": "kernel-docs-pdf-4.4.121-92.158.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.4.121-92.158.1.noarch",
"product": {
"name": "kernel-macros-4.4.121-92.158.1.noarch",
"product_id": "kernel-macros-4.4.121-92.158.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.4.121-92.158.1.noarch",
"product": {
"name": "kernel-source-4.4.121-92.158.1.noarch",
"product_id": "kernel-source-4.4.121-92.158.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.4.121-92.158.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.4.121-92.158.1.noarch",
"product_id": "kernel-source-vanilla-4.4.121-92.158.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-debug-4.4.121-92.158.1.ppc64le",
"product": {
"name": "cluster-md-kmp-debug-4.4.121-92.158.1.ppc64le",
"product_id": "cluster-md-kmp-debug-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.121-92.158.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.4.121-92.158.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-vanilla-4.4.121-92.158.1.ppc64le",
"product": {
"name": "cluster-md-kmp-vanilla-4.4.121-92.158.1.ppc64le",
"product_id": "cluster-md-kmp-vanilla-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-debug-4.4.121-92.158.1.ppc64le",
"product": {
"name": "cluster-network-kmp-debug-4.4.121-92.158.1.ppc64le",
"product_id": "cluster-network-kmp-debug-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-default-4.4.121-92.158.1.ppc64le",
"product": {
"name": "cluster-network-kmp-default-4.4.121-92.158.1.ppc64le",
"product_id": "cluster-network-kmp-default-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-vanilla-4.4.121-92.158.1.ppc64le",
"product": {
"name": "cluster-network-kmp-vanilla-4.4.121-92.158.1.ppc64le",
"product_id": "cluster-network-kmp-vanilla-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-debug-4.4.121-92.158.1.ppc64le",
"product": {
"name": "dlm-kmp-debug-4.4.121-92.158.1.ppc64le",
"product_id": "dlm-kmp-debug-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.121-92.158.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.4.121-92.158.1.ppc64le",
"product_id": "dlm-kmp-default-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-vanilla-4.4.121-92.158.1.ppc64le",
"product": {
"name": "dlm-kmp-vanilla-4.4.121-92.158.1.ppc64le",
"product_id": "dlm-kmp-vanilla-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-debug-4.4.121-92.158.1.ppc64le",
"product": {
"name": "gfs2-kmp-debug-4.4.121-92.158.1.ppc64le",
"product_id": "gfs2-kmp-debug-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.121-92.158.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.4.121-92.158.1.ppc64le",
"product_id": "gfs2-kmp-default-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-vanilla-4.4.121-92.158.1.ppc64le",
"product": {
"name": "gfs2-kmp-vanilla-4.4.121-92.158.1.ppc64le",
"product_id": "gfs2-kmp-vanilla-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-debug-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-debug-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-debug-base-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-debug-devel-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-extra-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-debug-extra-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-debug-extra-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-debug-kgraft-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-debug-kgraft-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-default-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-default-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-default-base-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-default-base-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-default-devel-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-default-extra-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-default-kgraft-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-obs-build-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-obs-qa-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-syms-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-syms-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-vanilla-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-vanilla-base-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-debug-4.4.121-92.158.1.ppc64le",
"product": {
"name": "ocfs2-kmp-debug-4.4.121-92.158.1.ppc64le",
"product_id": "ocfs2-kmp-debug-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.121-92.158.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.4.121-92.158.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-vanilla-4.4.121-92.158.1.ppc64le",
"product": {
"name": "ocfs2-kmp-vanilla-4.4.121-92.158.1.ppc64le",
"product_id": "ocfs2-kmp-vanilla-4.4.121-92.158.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.121-92.158.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.4.121-92.158.1.s390x",
"product_id": "cluster-md-kmp-default-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-vanilla-4.4.121-92.158.1.s390x",
"product": {
"name": "cluster-md-kmp-vanilla-4.4.121-92.158.1.s390x",
"product_id": "cluster-md-kmp-vanilla-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-default-4.4.121-92.158.1.s390x",
"product": {
"name": "cluster-network-kmp-default-4.4.121-92.158.1.s390x",
"product_id": "cluster-network-kmp-default-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-vanilla-4.4.121-92.158.1.s390x",
"product": {
"name": "cluster-network-kmp-vanilla-4.4.121-92.158.1.s390x",
"product_id": "cluster-network-kmp-vanilla-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.121-92.158.1.s390x",
"product": {
"name": "dlm-kmp-default-4.4.121-92.158.1.s390x",
"product_id": "dlm-kmp-default-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-vanilla-4.4.121-92.158.1.s390x",
"product": {
"name": "dlm-kmp-vanilla-4.4.121-92.158.1.s390x",
"product_id": "dlm-kmp-vanilla-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.121-92.158.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.4.121-92.158.1.s390x",
"product_id": "gfs2-kmp-default-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-vanilla-4.4.121-92.158.1.s390x",
"product": {
"name": "gfs2-kmp-vanilla-4.4.121-92.158.1.s390x",
"product_id": "gfs2-kmp-vanilla-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-default-4.4.121-92.158.1.s390x",
"product_id": "kernel-default-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-default-base-4.4.121-92.158.1.s390x",
"product_id": "kernel-default-base-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-default-devel-4.4.121-92.158.1.s390x",
"product_id": "kernel-default-devel-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-default-extra-4.4.121-92.158.1.s390x",
"product_id": "kernel-default-extra-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-default-kgraft-4.4.121-92.158.1.s390x",
"product_id": "kernel-default-kgraft-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-default-man-4.4.121-92.158.1.s390x",
"product_id": "kernel-default-man-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-obs-build-4.4.121-92.158.1.s390x",
"product_id": "kernel-obs-build-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-obs-qa-4.4.121-92.158.1.s390x",
"product_id": "kernel-obs-qa-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-syms-4.4.121-92.158.1.s390x",
"product_id": "kernel-syms-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-vanilla-4.4.121-92.158.1.s390x",
"product_id": "kernel-vanilla-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.4.121-92.158.1.s390x",
"product_id": "kernel-vanilla-base-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.4.121-92.158.1.s390x",
"product_id": "kernel-vanilla-devel-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.4.121-92.158.1.s390x",
"product_id": "kernel-zfcpdump-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.121-92.158.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.4.121-92.158.1.s390x",
"product_id": "ocfs2-kmp-default-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-vanilla-4.4.121-92.158.1.s390x",
"product": {
"name": "ocfs2-kmp-vanilla-4.4.121-92.158.1.s390x",
"product_id": "ocfs2-kmp-vanilla-4.4.121-92.158.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-debug-4.4.121-92.158.1.x86_64",
"product": {
"name": "cluster-md-kmp-debug-4.4.121-92.158.1.x86_64",
"product_id": "cluster-md-kmp-debug-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.121-92.158.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.4.121-92.158.1.x86_64",
"product_id": "cluster-md-kmp-default-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-vanilla-4.4.121-92.158.1.x86_64",
"product": {
"name": "cluster-md-kmp-vanilla-4.4.121-92.158.1.x86_64",
"product_id": "cluster-md-kmp-vanilla-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-debug-4.4.121-92.158.1.x86_64",
"product": {
"name": "cluster-network-kmp-debug-4.4.121-92.158.1.x86_64",
"product_id": "cluster-network-kmp-debug-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-default-4.4.121-92.158.1.x86_64",
"product": {
"name": "cluster-network-kmp-default-4.4.121-92.158.1.x86_64",
"product_id": "cluster-network-kmp-default-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-vanilla-4.4.121-92.158.1.x86_64",
"product": {
"name": "cluster-network-kmp-vanilla-4.4.121-92.158.1.x86_64",
"product_id": "cluster-network-kmp-vanilla-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-debug-4.4.121-92.158.1.x86_64",
"product": {
"name": "dlm-kmp-debug-4.4.121-92.158.1.x86_64",
"product_id": "dlm-kmp-debug-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.121-92.158.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.4.121-92.158.1.x86_64",
"product_id": "dlm-kmp-default-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-vanilla-4.4.121-92.158.1.x86_64",
"product": {
"name": "dlm-kmp-vanilla-4.4.121-92.158.1.x86_64",
"product_id": "dlm-kmp-vanilla-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-debug-4.4.121-92.158.1.x86_64",
"product": {
"name": "gfs2-kmp-debug-4.4.121-92.158.1.x86_64",
"product_id": "gfs2-kmp-debug-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.121-92.158.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.4.121-92.158.1.x86_64",
"product_id": "gfs2-kmp-default-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-vanilla-4.4.121-92.158.1.x86_64",
"product": {
"name": "gfs2-kmp-vanilla-4.4.121-92.158.1.x86_64",
"product_id": "gfs2-kmp-vanilla-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-debug-4.4.121-92.158.1.x86_64",
"product_id": "kernel-debug-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-debug-base-4.4.121-92.158.1.x86_64",
"product_id": "kernel-debug-base-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.4.121-92.158.1.x86_64",
"product_id": "kernel-debug-devel-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-extra-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-debug-extra-4.4.121-92.158.1.x86_64",
"product_id": "kernel-debug-extra-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-debug-kgraft-4.4.121-92.158.1.x86_64",
"product_id": "kernel-debug-kgraft-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-default-4.4.121-92.158.1.x86_64",
"product_id": "kernel-default-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-default-base-4.4.121-92.158.1.x86_64",
"product_id": "kernel-default-base-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-default-devel-4.4.121-92.158.1.x86_64",
"product_id": "kernel-default-devel-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-default-extra-4.4.121-92.158.1.x86_64",
"product_id": "kernel-default-extra-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-default-kgraft-4.4.121-92.158.1.x86_64",
"product_id": "kernel-default-kgraft-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-obs-build-4.4.121-92.158.1.x86_64",
"product_id": "kernel-obs-build-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.4.121-92.158.1.x86_64",
"product_id": "kernel-obs-qa-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-syms-4.4.121-92.158.1.x86_64",
"product_id": "kernel-syms-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-vanilla-4.4.121-92.158.1.x86_64",
"product_id": "kernel-vanilla-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.4.121-92.158.1.x86_64",
"product_id": "kernel-vanilla-base-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.4.121-92.158.1.x86_64",
"product_id": "kernel-vanilla-devel-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-debug-4.4.121-92.158.1.x86_64",
"product": {
"name": "ocfs2-kmp-debug-4.4.121-92.158.1.x86_64",
"product_id": "ocfs2-kmp-debug-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.121-92.158.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.4.121-92.158.1.x86_64",
"product_id": "ocfs2-kmp-default-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-vanilla-4.4.121-92.158.1.x86_64",
"product": {
"name": "ocfs2-kmp-vanilla-4.4.121-92.158.1.x86_64",
"product_id": "ocfs2-kmp-vanilla-4.4.121-92.158.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-bcl:12:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.121-92.158.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64"
},
"product_reference": "kernel-default-4.4.121-92.158.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.121-92.158.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.121-92.158.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.121-92.158.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.121-92.158.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.121-92.158.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch"
},
"product_reference": "kernel-devel-4.4.121-92.158.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.121-92.158.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch"
},
"product_reference": "kernel-macros-4.4.121-92.158.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.121-92.158.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch"
},
"product_reference": "kernel-source-4.4.121-92.158.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.121-92.158.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
},
"product_reference": "kernel-syms-4.4.121-92.158.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-24586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24586"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24586",
"url": "https://www.suse.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "moderate"
}
],
"title": "CVE-2020-24586"
},
{
"cve": "CVE-2020-24587",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24587"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24587",
"url": "https://www.suse.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1185862 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "moderate"
}
],
"title": "CVE-2020-24587"
},
{
"cve": "CVE-2020-24588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24588"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24588",
"url": "https://www.suse.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "SUSE Bug 1185861 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1192868"
},
{
"category": "external",
"summary": "SUSE Bug 1199701 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1199701"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "moderate"
}
],
"title": "CVE-2020-24588"
},
{
"cve": "CVE-2020-26139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26139"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26139",
"url": "https://www.suse.com/security/cve/CVE-2020-26139"
},
{
"category": "external",
"summary": "SUSE Bug 1186062 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "moderate"
}
],
"title": "CVE-2020-26139"
},
{
"cve": "CVE-2020-26141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26141"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26141",
"url": "https://www.suse.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "SUSE Bug 1185987 for CVE-2020-26141",
"url": "https://bugzilla.suse.com/1185987"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "moderate"
}
],
"title": "CVE-2020-26141"
},
{
"cve": "CVE-2020-26145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26145"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26145",
"url": "https://www.suse.com/security/cve/CVE-2020-26145"
},
{
"category": "external",
"summary": "SUSE Bug 1185860 for CVE-2020-26145",
"url": "https://bugzilla.suse.com/1185860"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "moderate"
}
],
"title": "CVE-2020-26145"
},
{
"cve": "CVE-2020-26147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26147"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26147",
"url": "https://www.suse.com/security/cve/CVE-2020-26147"
},
{
"category": "external",
"summary": "SUSE Bug 1233723 for CVE-2020-26147",
"url": "https://bugzilla.suse.com/1233723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "moderate"
}
],
"title": "CVE-2020-26147"
},
{
"cve": "CVE-2020-26558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26558"
}
],
"notes": [
{
"category": "general",
"text": "Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26558",
"url": "https://www.suse.com/security/cve/CVE-2020-26558"
},
{
"category": "external",
"summary": "SUSE Bug 1179610 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "moderate"
}
],
"title": "CVE-2020-26558"
},
{
"cve": "CVE-2020-36385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36385"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36385",
"url": "https://www.suse.com/security/cve/CVE-2020-36385"
},
{
"category": "external",
"summary": "SUSE Bug 1187050 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "external",
"summary": "SUSE Bug 1187052 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196914"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "important"
}
],
"title": "CVE-2020-36385"
},
{
"cve": "CVE-2020-36386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36386"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.8.1. net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36386",
"url": "https://www.suse.com/security/cve/CVE-2020-36386"
},
{
"category": "external",
"summary": "SUSE Bug 1187038 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "moderate"
}
],
"title": "CVE-2020-36386"
},
{
"cve": "CVE-2021-0129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0129"
}
],
"notes": [
{
"category": "general",
"text": "Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0129",
"url": "https://www.suse.com/security/cve/CVE-2021-0129"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2021-0129",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "moderate"
}
],
"title": "CVE-2021-0129"
},
{
"cve": "CVE-2021-0512",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0512"
}
],
"notes": [
{
"category": "general",
"text": "In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-173843328References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0512",
"url": "https://www.suse.com/security/cve/CVE-2021-0512"
},
{
"category": "external",
"summary": "SUSE Bug 1187595 for CVE-2021-0512",
"url": "https://bugzilla.suse.com/1187595"
},
{
"category": "external",
"summary": "SUSE Bug 1187597 for CVE-2021-0512",
"url": "https://bugzilla.suse.com/1187597"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "important"
}
],
"title": "CVE-2021-0512"
},
{
"cve": "CVE-2021-0605",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0605"
}
],
"notes": [
{
"category": "general",
"text": "In pfkey_dump of af_key.c, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-110373476",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0605",
"url": "https://www.suse.com/security/cve/CVE-2021-0605"
},
{
"category": "external",
"summary": "SUSE Bug 1187601 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1187601"
},
{
"category": "external",
"summary": "SUSE Bug 1187687 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1187687"
},
{
"category": "external",
"summary": "SUSE Bug 1188381 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1188381"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "important"
}
],
"title": "CVE-2021-0605"
},
{
"cve": "CVE-2021-22555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22555"
}
],
"notes": [
{
"category": "general",
"text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22555",
"url": "https://www.suse.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "SUSE Bug 1188116 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "external",
"summary": "SUSE Bug 1188117 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "external",
"summary": "SUSE Bug 1188411 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "important"
}
],
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-23134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23134"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23134",
"url": "https://www.suse.com/security/cve/CVE-2021-23134"
},
{
"category": "external",
"summary": "SUSE Bug 1186060 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "external",
"summary": "SUSE Bug 1186061 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "external",
"summary": "SUSE Bug 1220739 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1220739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "important"
}
],
"title": "CVE-2021-23134"
},
{
"cve": "CVE-2021-32399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32399"
}
],
"notes": [
{
"category": "general",
"text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32399",
"url": "https://www.suse.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "SUSE Bug 1184611 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "external",
"summary": "SUSE Bug 1185898 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "external",
"summary": "SUSE Bug 1185899 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "important"
}
],
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-33034",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33034"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33034",
"url": "https://www.suse.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "SUSE Bug 1186111 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "external",
"summary": "SUSE Bug 1186285 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "important"
}
],
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-34693",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-34693"
}
],
"notes": [
{
"category": "general",
"text": "net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-34693",
"url": "https://www.suse.com/security/cve/CVE-2021-34693"
},
{
"category": "external",
"summary": "SUSE Bug 1187452 for CVE-2021-34693",
"url": "https://bugzilla.suse.com/1187452"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2021-34693",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "moderate"
}
],
"title": "CVE-2021-34693"
},
{
"cve": "CVE-2021-3609",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3609"
}
],
"notes": [
{
"category": "general",
"text": ".A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3609",
"url": "https://www.suse.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "SUSE Bug 1187215 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "external",
"summary": "SUSE Bug 1188323 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188323"
},
{
"category": "external",
"summary": "SUSE Bug 1188720 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188720"
},
{
"category": "external",
"summary": "SUSE Bug 1190276 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1190276"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1196810"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "moderate"
}
],
"title": "CVE-2021-3609"
}
]
}
suse-su-2021:1975-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP3 Azure kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-33200: Enforcing incorrect limits for pointer arithmetic operations by the BPF verifier could be abused to perform out-of-bounds reads and writes in kernel memory (bsc#1186484).\n- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values. (bsc#1186111)\n- CVE-2020-26139: Fixed a denial-of-service when an Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. (bnc#1186062)\n- CVE-2021-23134: A Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges. (bnc#1186060)\n- CVE-2021-3491: Fixed a potential heap overflow in mem_rw(). This vulnerability is related to the PROVIDE_BUFFERS operation, which allowed the MAX_RW_COUNT limit to be bypassed (bsc#1185642).\n- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).\n- CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances this can be abused to inject arbitrary network packets and/or exfiltrate user data (bnc#1185859).\n- CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed (bnc#1185859 bnc#1185862).\n- CVE-2020-24588: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets. (bnc#1185861)\n- CVE-2020-26147: The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments, even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used (bnc#1185859).\n- CVE-2020-26145: An issue was discovered with Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration. (bnc#1185860)\n- CVE-2020-26141: An issue was discovered in the ALFA driver for AWUS036H, where the Message Integrity Check (authenticity) of fragmented TKIP frames was not verified. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bnc#1185987)\n- CVE-2021-29650: Fixed an issue with the netfilter subsystem that allowed attackers to cause a denial of service (panic) because net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h lack a full memory barrier upon the assignment of a new table value (bnc#1184208).\n- CVE-2021-29155: Fixed an issue that was discovered in kernel/bpf/verifier.c that performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory. Specifically, for sequences of pointer arithmetic operations, the pointer modification performed by the first operation was not correctly accounted for when restricting subsequent operations (bnc#1184942).\n- CVE-2021-3444: Fixed an issue with the bpf verifier which did not properly handle mod32 destination register truncation when the source register was known to be 0 leading to out of bounds read (bsc#1184170).\n- CVE-2021-3428: Fixed an integer overflow in ext4_es_cache_extent (bsc#1173485).\n- CVE-2021-29647: Fixed an issue in qrtr_recvmsg which could have allowed attackers to obtain sensitive information from kernel memory because of a partially uninitialized data structure (bsc#1184192 ).\n- CVE-2021-29265: Fixed an issue in usbip_sockfd_store which could have allowed attackers to cause a denial of service due to race conditions during an update of the local and shared status (bsc#1184167).\n- CVE-2021-29264: Fixed an issue in the Freescale Gianfar Ethernet driver which could have allowed attackers to cause a system crash due to a calculation of negative fragment size (bsc#1184168).\n- CVE-2021-28972: Fixed a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly (bsc#1184198).\n- CVE-2021-28971: Fixed an issue in intel_pmu_drain_pebs_nhm which could have caused a system crash because the PEBS status in a PEBS record was mishandled (bsc#1184196 ).\n- CVE-2021-28964: Fixed a race condition in get_old_root which could have allowed attackers to cause a denial of service (bsc#1184193).\n- CVE-2021-28688: Fixed an issue introduced by XSA-365 (bsc#1183646).\n- CVE-2021-28660: Fixed an out of bounds write in rtw_wx_set_scan (bsc#1183593 ).\n- CVE-2021-28375: Fixed an issue in fastrpc_internal_invoke which did not prevent user applications from sending kernel RPC messages (bsc#1183596).\n- CVE-2021-28038: Fixed an issue with the netback driver which was lacking necessary treatment of errors such as failed memory allocations (bsc#1183022).\n- CVE-2021-27365: Fixed an issue where an unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message (bsc#1182715).\n- CVE-2021-27364: Fixed an issue where an attacker could craft Netlink messages (bsc#1182717).\n- CVE-2021-27363: Fixed a kernel pointer leak which could have been used to determine the address of the iscsi_transport structure (bsc#1182716).\n- CVE-2020-35519: Fixed an out-of-bounds memory access was found in x25_bind (bsc#1183696).\n- CVE-2020-27815: Fixed an issue in JFS filesystem where could have allowed an attacker to execute code (bsc#1179454).\n- CVE-2020-27171: Fixed an off-by-one error affecting out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory (bsc#1183775).\n- CVE-2020-27170: Fixed potential side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory (bsc#1183686).\n- CVE-2019-19769: Fixed a use-after-free in the perf_trace_lock_acquire function (bsc#1159280 ).\n- CVE-2019-18814: Fixed a use-after-free when aa_label_parse() fails in aa_audit_rule_init() (bsc#1156256).\n- CVE-2021-3483: Fixed a use-after-free in nosy.c (bsc#1184393).\n- CVE-2021-30002: Fixed a memory leak for large arguments in video_usercopy (bsc#1184120).\n- CVE-2021-29154: Fixed incorrect computation of branch displacements, allowing arbitrary code execution (bsc#1184391).\n- CVE-2021-28950: Fixed an issue in fs/fuse/fuse_i.h due to a retry loop continually was finding the same bad inode (bsc#1184194).\n- CVE-2021-28952: Fixed a buffer overflow in the soundwire device driver, triggered when an unexpected port ID number is encountered. (bnc#1184197).\n- CVE-2021-20268: Fixed an out-of-bounds access flaw in the implementation of the eBPF code verifier. This flaw allowed a local user to crash the system or possibly escalate their privileges. (bnc#1183077)\n- CVE-2020-27673: Fixed a vulnerability with xen, where guest OS users could cause a denial of service (host OS hang) via a high rate of events to dom0 (bnc#1177411).\n- CVE-2020-36312: Fixed a memory leak upon a kmalloc failure (bsc#1184509 ).\n- CVE-2020-36311: Fixed a denial of service (soft lockup) by triggering destruction of a large SEV VM (bsc#1184511).\n- CVE-2020-36310: Fixed infinite loop for certain nested page faults (bsc#1184512).\n- CVE-2021-3489: Fixed an issue where the eBPF RINGBUF bpf_ringbuf_reserve did not check that the allocated size was smaller than the ringbuf size (bnc#1185640).\n- CVE-2021-3490: Fixed an issue where the eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) did not update the 32-bit bounds (bnc#1185641 bnc#1185796 ).\n- CVE-2020-36322: Fixed an issue was discovered in FUSE filesystem implementation which could have caused a system crash (bsc#1184211).\n- CVE-2020-25670, CVE-2020-25671, CVE-2020-25672, CVE-2020-25673: Fixed multiple bugs in NFC subsytem (bsc#1178181).\n\nThe following non-security bugs were fixed:\n\n- ACPI / hotplug / PCI: Fix reference count leak in enable_slot() (git-fixes).\n- ACPI / idle: override c-state latency when not in conformance with s0ix (bsc#1185840).\n- ACPI: CPPC: Replace cppc_attr with kobj_attribute (git-fixes).\n- ACPI: GTDT: Do not corrupt interrupt mappings on watchdow probe failure (git-fixes).\n- ACPI: PM: Add ACPI ID of Alder Lake Fan (git-fixes).\n- ACPI: PM: s2idle: Add AMD support to handle _DSM (bsc#1185840).\n- ACPI: PM: s2idle: Add missing LPS0 functions for AMD (bsc#1185840).\n- ACPI: PM: s2idle: Drop unused local variables and related code (bsc#1185840).\n- ACPI: PM: s2idle: Move x86-specific code to the x86 directory (bsc#1185840).\n- ACPI: custom_method: fix a possible memory leak (git-fixes).\n- ACPI: custom_method: fix potential use-after-free issue (git-fixes).\n- ACPI: processor: Fix CPU0 wakeup in acpi_idle_play_dead() (git-fixes).\n- ACPI: processor: Fix build when CONFIG_ACPI_PROCESSOR=m (git-fixes).\n- ACPI: scan: Rearrange memory allocation in acpi_device_add() (git-fixes).\n- ACPI: video: Add DMI quirk for GIGABYTE GB-BXBT-2807 (git-fixes).\n- ACPI: video: Add missing callback back for Sony VPCEH3U1E (git-fixes).\n- ACPICA: Always create namespace nodes using acpi_ns_create_node() (git-fixes).\n- ACPICA: Enable sleep button on ACPI legacy wake (bsc#1181383).\n- ACPICA: Fix race in generic_serial_bus (I2C) and GPIO op_region parameter handling (git-fixes).\n- ALSA: Convert strlcpy to strscpy when return value is unused (git-fixes).\n- ALSA: aloop: Fix initialization of controls (git-fixes).\n- ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro (git-fixes).\n- ALSA: bebob: enable to deliver MIDI messages for multiple ports (git-fixes).\n- ALSA: core: remove redundant spin_lock pair in snd_card_disconnect (git-fixes).\n- ALSA: dice: fix null pointer dereference when node is disconnected (git-fixes).\n- ALSA: dice: fix stream format at middle sampling rate for Alesis iO 26 (git-fixes).\n- ALSA: dice: fix stream format for TC Electronic Konnekt Live at high sampling transfer frequency (git-fixes).\n- ALSA: emu8000: Fix a use after free in snd_emu8000_create_mixer (git-fixes).\n- ALSA: firewire-lib: fix amdtp_packet tracepoints event for packet_index field (git-fixes).\n- ALSA: firewire-lib: fix calculation for size of IR context payload (git-fixes).\n- ALSA: firewire-lib: fix check for the size of isochronous packet payload (git-fixes).\n- ALSA: hda/ca0132: Add Sound BlasterX AE-5 Plus support (git-fixes).\n- ALSA: hda/cirrus: Add Headphone and Headset MIC Volume Control (git-fixes).\n- ALSA: hda/cirrus: Add error handling into CS8409 I2C functions (git-fixes).\n- ALSA: hda/cirrus: Add jack detect interrupt support from CS42L42 companion codec (git-fixes).\n- ALSA: hda/cirrus: Add support for CS8409 HDA bridge and CS42L42 companion codec (git-fixes).\n- ALSA: hda/cirrus: Cleanup patch_cirrus.c code (git-fixes).\n- ALSA: hda/cirrus: Fix CS42L42 Headset Mic volume control name (git-fixes).\n- ALSA: hda/cirrus: Make CS8409 driver more generic by using fixups (git-fixes).\n- ALSA: hda/cirrus: Set Initial DMIC volume for Bullseye to -26 dB (git-fixes).\n- ALSA: hda/cirrus: Use CS8409 filter to fix abnormal sounds on Bullseye (git-fixes).\n- ALSA: hda/conexant: Add quirk for mute LED control on HP ZBook G5 (git-fixes).\n- ALSA: hda/conexant: Apply quirk for another HP ZBook G5 model (git-fixes).\n- ALSA: hda/conexant: Re-order CX5066 quirk table entries (git-fixes).\n- ALSA: hda/conexant: Re-order CX5066 quirk table entries (git-fixes).\n- ALSA: hda/hdmi: Cancel pending works before suspend (bsc#1182377).\n- ALSA: hda/hdmi: Cancel pending works before suspend (git-fixes).\n- ALSA: hda/hdmi: fix race in handling acomp ELD notification at resume (git-fixes).\n- ALSA: hda/realtek - Headset Mic issue on HP platform (git-fixes).\n- ALSA: hda/realtek: ALC285 Thinkpad jack pin quirk is unreachable (git-fixes).\n- ALSA: hda/realtek: Add fixup for HP OMEN laptop (git-fixes).\n- ALSA: hda/realtek: Add fixup for HP Spectre x360 15-df0xxx (git-fixes).\n- ALSA: hda/realtek: Add quirk for Intel Clevo PCx0Dx (git-fixes).\n- ALSA: hda/realtek: Add quirk for Lenovo Ideapad S740 (git-fixes).\n- ALSA: hda/realtek: Add some CLOVE SSIDs of ALC293 (git-fixes).\n- ALSA: hda/realtek: Apply headset-mic quirks for Xiaomi Redmibook Air (git-fixes).\n- ALSA: hda/realtek: Chain in pop reduction fixup for ThinkStation P340 (git-fixes).\n- ALSA: hda/realtek: Enable mute/micmute LEDs and limit mic boost on EliteBook 845 G8 (git-fixes).\n- ALSA: hda/realtek: Fix silent headphone output on ASUS UX430UA (git-fixes).\n- ALSA: hda/realtek: Fix speaker amp on HP Envy AiO 32 (git-fixes).\n- ALSA: hda/realtek: Fix speaker amp setup on Acer Aspire E1 (git-fixes).\n- ALSA: hda/realtek: GA503 use same quirks as GA401 (git-fixes).\n- ALSA: hda/realtek: Headphone volume is controlled by Front mixer (git-fixes).\n- ALSA: hda/realtek: Re-order ALC269 ASUS quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC269 Acer quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC269 Dell quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC269 HP quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC269 Lenovo quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC269 Sony quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC662 quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC882 Acer quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC882 Clevo quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC882 Sony quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order remaining ALC269 quirk table entries (git-fixes).\n- ALSA: hda/realtek: Remove redundant entry for ALC861 Haier/Uniwill devices (git-fixes).\n- ALSA: hda/realtek: apply pin quirk for XiaomiNotebook Pro (git-fixes).\n- ALSA: hda/realtek: call alc_update_headset_mode() in hp_automute_hook (git-fixes).\n- ALSA: hda/realtek: fix a determine_headset_type issue for a Dell AIO (git-fixes).\n- ALSA: hda/realtek: fix mic boost on Intel NUC 8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs and speaker for HP Zbook Fury 15 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs and speaker for HP Zbook Fury 17 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs and speaker for HP Zbook G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP 440 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP 640 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP 840 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP 850 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP 855 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP ProBook 445 G7 (git-fixes).\n- ALSA: hda/realtek: fix static noise on ALC285 Lenovo laptops (git-fixes).\n- ALSA: hda/realtek: reset eapd coeff to default value for alc287 (git-fixes).\n- ALSA: hda/realtek: the bass speaker can\u0027t output sound on Yoga 9i (git-fixes).\n- ALSA: hda: Add missing sanity checks in PM prepare/complete callbacks (git-fixes).\n- ALSA: hda: Avoid spurious unsol event handling during S3/S4 (bsc#1182377).\n- ALSA: hda: Avoid spurious unsol event handling during S3/S4 (git-fixes).\n- ALSA: hda: Drop the BATCH workaround for AMD controllers (git-fixes).\n- ALSA: hda: Flush pending unsolicited events before suspend (bsc#1182377).\n- ALSA: hda: Re-add dropped snd_poewr_change_state() calls (git-fixes).\n- ALSA: hda: fixup headset for ASUS GU502 laptop (git-fixes).\n- ALSA: hda: fixup headset for ASUS GU502 laptop (git-fixes).\n- ALSA: hda: generic: Fix the micmute led init state (git-fixes).\n- ALSA: hda: generic: change the DAC ctl name for LO+SPK or LO+HP (git-fixes).\n- ALSA: hda: ignore invalid NHLT table (git-fixes).\n- ALSA: hdsp: do not disable if not enabled (git-fixes).\n- ALSA: hdspm: do not disable if not enabled (git-fixes).\n- ALSA: intel8x0: Do not update period unless prepared (git-fixes).\n- ALSA: line6: Fix racy initialization of LINE6 MIDI (git-fixes).\n- ALSA: rme9652: do not disable if not enabled (git-fixes).\n- ALSA: sb: Fix two use after free in snd_sb_qsound_build (git-fixes).\n- ALSA: usb-audio: Add DJM-450 to the quirks table (git-fixes).\n- ALSA: usb-audio: Add DJM450 to Pioneer format quirk (git-fixes).\n- ALSA: usb-audio: Add DJM450 to Pioneer format quirk (git-fixes).\n- ALSA: usb-audio: Add DJM750 to Pioneer mixer quirk (git-fixes).\n- ALSA: usb-audio: Add MIDI quirk for Vox ToneLab EX (git-fixes).\n- ALSA: usb-audio: Add Pioneer DJM-850 to quirks-table (git-fixes).\n- ALSA: usb-audio: Add dB range mapping for Sennheiser Communications Headset PC 8 (git-fixes).\n- ALSA: usb-audio: Add error checks for usb_driver_claim_interface() calls (git-fixes).\n- ALSA: usb-audio: Add implicit feeback support for the BOSS GT-1 (git-fixes).\n- ALSA: usb-audio: Add support for Pioneer DJM-750 (git-fixes).\n- ALSA: usb-audio: Add support for many Roland devices\u0027 implicit feedback quirks (git-fixes).\n- ALSA: usb-audio: Apply implicit feedback mode for BOSS devices (git-fixes).\n- ALSA: usb-audio: Apply sample rate quirk to Logitech Connect (git-fixes).\n- ALSA: usb-audio: Carve out connector value checking into a helper (git-fixes).\n- ALSA: usb-audio: Check connector value on resume (git-fixes).\n- ALSA: usb-audio: Configure Pioneer DJM-850 samplerate (git-fixes).\n- ALSA: usb-audio: Convert remaining strlcpy() to strscpy() (git-fixes).\n- ALSA: usb-audio: Convert the last strlcpy() usage (git-fixes).\n- ALSA: usb-audio: DJM-750: ensure format is set (git-fixes).\n- ALSA: usb-audio: Declare Pioneer DJM-850 mixer controls (git-fixes).\n- ALSA: usb-audio: Drop implicit fb quirk entries dubbed for capture (git-fixes).\n- ALSA: usb-audio: Explicitly set up the clock selector (git-fixes).\n- ALSA: usb-audio: Fix \u0027RANGE setting not yet supported\u0027 errors (git-fixes).\n- ALSA: usb-audio: Fix Pioneer DJM devices URB_CONTROL request direction to set samplerate (git-fixes).\n- ALSA: usb-audio: Fix Pioneer DJM devices URB_CONTROL request direction to set samplerate (git-fixes).\n- ALSA: usb-audio: Fix implicit sync clearance at stopping stream (git-fixes).\n- ALSA: usb-audio: Fix potential out-of-bounce access in MIDI EP parser (git-fixes).\n- ALSA: usb-audio: Fix unintentional sign extension issue (git-fixes).\n- ALSA: usb-audio: Generic application of implicit fb to Roland/BOSS devices (git-fixes).\n- ALSA: usb-audio: Re-apply implicit feedback mode to Pioneer devices (git-fixes).\n- ALSA: usb-audio: Remove redundant assignment to len (git-fixes).\n- ALSA: usb-audio: Skip probe of UA-101 devices (git-fixes).\n- ALSA: usb-audio: Skip the clock selector inquiry for single connections (git-fixes).\n- ALSA: usb-audio: Validate MS endpoint descriptors (git-fixes).\n- ALSA: usb-audio: add mixer quirks for Pioneer DJM-900NXS2 (git-fixes).\n- ALSA: usb-audio: fix NULL ptr dereference in usb_audio_probe (bsc#1182552).\n- ALSA: usb-audio: fix Pioneer DJM-850 control label info (git-fixes).\n- ALSA: usb-audio: fix control-request direction (git-fixes).\n- ALSA: usb-audio: fix use after free in usb_audio_disconnect (bsc#1182552).\n- ALSA: usb-audio: generate midi streaming substream names from jack names (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix device hang with ehci-pci (git-fixes).\n- ALSA: usb-audio: scarlett2: Improve driver startup messages (git-fixes).\n- ALSA: usb-audio: scarlett2: snd_scarlett_gen2_controls_create() can be static (git-fixes).\n- ALSA: usb-audio: use usb headers rather than define structs locally (git-fixes).\n- ALSA: usb: Use DIV_ROUND_UP() instead of open-coding it (git-fixes).\n- ALSA: usb: midi: do not return -ENOMEM when usb_urb_ep_type_check fails (git-fixes).\n- ARM64: vdso32: Install vdso32 from vdso_install (git-fixes).\n- ASoC: Intel: Add DMI quirk table to soc_intel_is_byt_cr() (git-fixes).\n- ASoC: Intel: boards: sof-wm8804: add check for PLL setting (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for ARCHOS Cesium 140 (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for the Acer One S1002 tablet (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for the Chuwi Hi8 tablet (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for the Estar Beauty HD MID 7316R tablet (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for the Voyo Winpad A15 tablet (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Enable jack-detect support on Asus T100TAF (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Fix HP Pavilion x2 10-p0XX OVCD current threshold (git-fixes).\n- ASoC: Intel: bytcr_rt5651: Add quirk for the Jumper EZpad 7 tablet (git-fixes).\n- ASoC: Intel: kbl_da7219_max98927: Fix kabylake_ssp_fixup function (git-fixes).\n- ASoC: Intel: sof_sdw: add quirk for HP Spectre x360 convertible (git-fixes).\n- ASoC: Intel: sof_sdw: add quirk for new ADL-P Rvp (git-fixes).\n- ASoC: Intel: sof_sdw: reorganize quirks by generation (git-fixes).\n- ASoC: SOF: Intel: HDA: fix core status verification (git-fixes).\n- ASoC: SOF: Intel: HDA: fix core status verification (git-fixes).\n- ASoC: SOF: Intel: hda: remove unnecessary parentheses (git-fixes).\n- ASoC: SOF: Intel: unregister DMIC device on probe error (git-fixes).\n- ASoC: SOF: intel: fix wrong poll bits in dsp power down (git-fixes).\n- ASoC: ak4458: Add MODULE_DEVICE_TABLE (git-fixes).\n- ASoC: ak5558: Add MODULE_DEVICE_TABLE (git-fixes).\n- ASoC: ak5558: Fix s/show/slow/ typo (git-fixes).\n- ASoC: ak5558: correct reset polarity (git-fixes).\n- ASoC: codecs: wcd934x: add a sanity check in set channel map (git-fixes).\n- ASoC: cs35l33: fix an error code in probe() (git-fixes).\n- ASoC: cs42l42: Always wait at least 3ms after reset (git-fixes).\n- ASoC: cs42l42: Do not enable/disable regulator at Bias Level (git-fixes).\n- ASoC: cs42l42: Fix Bitclock polarity inversion (git-fixes).\n- ASoC: cs42l42: Fix channel width support (git-fixes).\n- ASoC: cs42l42: Fix mixer volume control (git-fixes).\n- ASoC: cs42l42: Regmap must use_single_read/write (git-fixes).\n- ASoC: cygnus: fix for_each_child.cocci warnings (git-fixes).\n- ASoC: es8316: Simplify adc_pga_gain_tlv table (git-fixes).\n- ASoC: fsl_esai: Fix TDM slot setup for I2S mode (git-fixes).\n- ASoC: fsl_ssi: Fix TDM slot setup for I2S mode (git-fixes).\n- ASoC: intel: atom: Remove 44100 sample-rate from the media and deep-buffer DAI descriptions (git-fixes).\n- ASoC: intel: atom: Stop advertising non working S24LE support (git-fixes).\n- ASoC: max98373: Added 30ms turn on/off time delay (git-fixes).\n- ASoC: max98373: Changed amp shutdown register as volatile (git-fixes).\n- ASoC: qcom: lpass-cpu: Fix lpass dai ids parse (git-fixes).\n- ASoC: qcom: sdm845: Fix array out of bounds access (git-fixes).\n- ASoC: qcom: sdm845: Fix array out of range on rx slim channels (git-fixes).\n- ASoC: rsnd: call rsnd_ssi_master_clk_start() from rsnd_ssi_init() (git-fixes).\n- ASoC: rsnd: check all BUSIF status when error (git-fixes).\n- ASoC: rsnd: core: Check convert rate in rsnd_hw_params (git-fixes).\n- ASoC: rt1015: fix i2c communication error (git-fixes).\n- ASoC: rt286: Generalize support for ALC3263 codec (git-fixes).\n- ASoC: rt286: Make RT286_SET_GPIO_* readable and writable (git-fixes).\n- ASoC: rt5640: Fix dac- and adc- vol-tlv values being off by a factor of 10 (git-fixes).\n- ASoC: rt5651: Fix dac- and adc- vol-tlv values being off by a factor of 10 (git-fixes).\n- ASoC: rt5659: Update MCLK rate in set_sysclk() (git-fixes).\n- ASoC: rt5670: Add a quirk for the Dell Venue 10 Pro 5055 (git-fixes).\n- ASoC: rt5670: Add emulated \u0027DAC1 Playback Switch\u0027 control (git-fixes).\n- ASoC: rt5670: Remove \u0027HP Playback Switch\u0027 control (git-fixes).\n- ASoC: rt5670: Remove \u0027OUT Channel Switch\u0027 control (git-fixes).\n- ASoC: rt5670: Remove ADC vol-ctrl mute bits poking from Sto1 ADC mixer settings (git-fixes).\n- ASoC: rt711: add snd_soc_component remove callback (git-fixes).\n- ASoC: samsung: snow: remove useless test (git-fixes).\n- ASoC: samsung: tm2_wm5110: check of of_parse return value (git-fixes).\n- ASoC: sgtl5000: set DAP_AVC_CTRL register to correct default value on probe (git-fixes).\n- ASoC: simple-card-utils: Do not handle device clock (git-fixes).\n- ASoC: simple-card: fix possible uninitialized single_cpu local variable (git-fixes).\n- ASoC: soc-core kABI workaround (git-fixes).\n- ASoC: soc-core: Prevent warning if no DMI table is present (git-fixes).\n- ASoC: sunxi: sun4i-codec: fill ASoC card owner (git-fixes).\n- ASoC: wm8960: Fix wrong bclk and lrclk with pll enabled for some chips (git-fixes).\n- ASoC: wm8960: Remove bitclk relax condition in wm8960_configure_sysclk (git-fixes).\n- Bluetooth: Fix incorrect status handling in LE PHY UPDATE event (git-fixes).\n- Bluetooth: Fix null pointer dereference in amp_read_loc_assoc_final_data (git-fixes).\n- Bluetooth: L2CAP: Fix handling LE modes by L2CAP_OPTIONS (git-fixes).\n- Bluetooth: SMP: Fail if remote and local public keys are identical (git-fixes).\n- Bluetooth: Set CONF_NOT_COMPLETE as l2cap_chan default (git-fixes).\n- Bluetooth: avoid deadlock between hci_dev-\u003elock and socket lock (git-fixes).\n- Bluetooth: btqca: Add valid le states quirk (git-fixes).\n- Bluetooth: btusb: Enable quirk boolean flag for Mediatek Chip (git-fixes).\n- Bluetooth: check for zapped sk before connecting (git-fixes).\n- Bluetooth: hci_h5: Set HCI_QUIRK_SIMULTANEOUS_DISCOVERY for btrtl (git-fixes).\n- Bluetooth: initialize skb_queue_head at l2cap_chan_create() (git-fixes).\n- Documentation/ABI: sysfs-platform-ideapad-laptop: update device attribute paths (git-fixes).\n- Drivers: hv: vmbus: Fix Suspend-to-Idle for Generation-2 VM (git-fixes).\n- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185725).\n- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185725).\n- Drivers: hv: vmbus: Use after free in __vmbus_open() (git-fixes).\n- EDAC/amd64: Check for memory before fully initializing an instance (bsc#1183815).\n- EDAC/amd64: Get rid of the ECC disabled long message (bsc#1183815).\n- EDAC/amd64: Use cached data when checking for ECC (bsc#1183815).\n- Goodix Fingerprint device is not a modem (git-fixes).\n- HID: alps: fix error return code in alps_input_configured() (git-fixes).\n- HID: google: add don USB id (git-fixes).\n- HID: i2c-hid: Add I2C_HID_QUIRK_NO_IRQ_AFTER_RESET for ITE8568 EC on Voyo Winpad A15 (git-fixes).\n- HID: mf: add support for 0079:1846 Mayflash/Dragonrise USB Gamecube Adapter (git-fixes).\n- HID: plantronics: Workaround for double volume key presses (git-fixes).\n- HID: wacom: Assign boolean values to a bool variable (git-fixes).\n- HID: wacom: set EV_KEY and EV_ABS only for non-HID_GENERIC type of devices (git-fixes).\n- HSI: Fix PM usage counter unbalance in ssi_hw_init (git-fixes).\n- Hibernation: Fix Hibernate not blocked in Secure Boot with no EFI secret key \n- IB/hfi1: Fix probe time panic when AIP is enabled with a buggy BIOS (jsc#SLE-13208).\n- IB/hfi1: Rework AIP and VNIC dummy netdev usage (jsc#SLE-13208).\n- Input: applespi - do not wait for responses to commands indefinitely (git-fixes).\n- Input: elantech - fix protocol errors for some trackpoints in SMBus mode (git-fixes).\n- Input: elants_i2c - do not bind to i2c-hid compatible ACPI instantiated devices (git-fixes).\n- Input: i8042 - fix Pegatron C15B ID entry (git-fixes).\n- Input: nspire-keypad - enable interrupts only when opened (git-fixes).\n- Input: s6sy761 - fix coordinate read bit shift (git-fixes).\n- Input: silead - add workaround for x86 BIOS-es which bring the chip up in a stuck state (git-fixes).\n- KEYS: trusted: Fix TPM reservation for seal/unseal (git-fixes).\n- KEYS: trusted: Fix memory leak on object td (git-fixes).\n- KVM x86: Extend AMD specific guest behavior to Hygon virtual CPUs (bsc#1183447).\n- KVM: PPC: Book3S HV P9: Restore host CTRL SPR after guest exit (bsc#1156395).\n- KVM: PPC: Make the VMX instruction emulation routines static (bsc#1156395).\n- KVM: SVM: Clear the CR4 register on reset (bsc#1183252).\n- KVM: kvmclock: Fix vCPUs \u003e 64 can\u0027t be online/hotpluged (bsc#1152489).\n- KVM: nVMX: Properly handle userspace interrupt window request (bsc#1183427).\n- KVM: s390: fix guarded storage control register handling (bsc#1133021).\n- KVM: x86: Add helpers to perform CPUID-based guest vendor check (bsc#1183445).\n- KVM: x86: Allow guests to see MSR_IA32_TSX_CTRL even if tsx=off (bsc#1183287).\n- KVM: x86: Allow guests to see MSR_IA32_TSX_CTRL even if tsx=off (bsc#1183323).\n- KVM: x86: Expose XSAVEERPTR to the guest (jsc#SLE-13573).\n- KVM: x86: Return -E2BIG when KVM_GET_SUPPORTED_CPUID hits max entries (bsc#1183428).\n- KVM: x86: Set so called \u0027reserved CR3 bits in LM mask\u0027 at vCPU reset (bsc#1183288).\n- KVM: x86: Set so called \u0027reserved CR3 bits in LM mask\u0027 at vCPU reset (bsc#1183324).\n- KVM: x86: do not reset microcode version on INIT or RESET (bsc#1183412).\n- KVM: x86: list MSR_IA32_UCODE_REV as an emulated MSR (bsc#1183369).\n- NFC: nci: fix memory leak in nci_allocate_device (git-fixes).\n- PCI/AER: Add RCEC AER error injection support (bsc#1174426).\n- PCI/AER: Add pcie_walk_rcec() to RCEC AER handling (bsc#1174426).\n- PCI/AER: Clear AER status from Root Port when resetting Downstream Port (bsc#1174426).\n- PCI/AER: Specify the type of Port that was reset (bsc#1174426).\n- PCI/AER: Use \u0027aer\u0027 variable for capability offset (bsc#1174426).\n- PCI/AER: Write AER Capability only when we control it (bsc#1174426).\n- PCI/ERR: Add pci_walk_bridge() to pcie_do_recovery() (bsc#1174426).\n- PCI/ERR: Add pcie_link_rcec() to associate RCiEPs (bsc#1174426).\n- PCI/ERR: Avoid negated conditional for clarity (bsc#1174426).\n- PCI/ERR: Bind RCEC devices to the Root Port driver (bsc#1174426).\n- PCI/ERR: Bind RCEC devices to the Root Port driver (jsc#SLE-13736 jsc#SLE-14845).\n- PCI/ERR: Cache RCEC EA Capability offset in pci_init_capabilities() (bsc#1174426).\n- PCI/ERR: Clear AER status only when we control AER (bsc#1174426).\n- PCI/ERR: Clear PCIe Device Status errors only if OS owns AER (bsc#1174426).\n- PCI/ERR: Clear status of the reporting device (bsc#1174426).\n- PCI/ERR: Recover from RCEC AER errors (bsc#1174426).\n- PCI/ERR: Recover from RCiEP AER errors (bsc#1174426).\n- PCI/ERR: Rename reset_link() to reset_subordinates() (bsc#1174426).\n- PCI/ERR: Retain status from error notification (bsc#1174426).\n- PCI/ERR: Simplify by computing pci_pcie_type() once (bsc#1174426).\n- PCI/ERR: Simplify by using pci_upstream_bridge() (bsc#1174426).\n- PCI/ERR: Use \u0027bridge\u0027 for clarity in pcie_do_recovery() (bsc#1174426).\n- PCI/PME: Add pcie_walk_rcec() to RCEC PME handling (bsc#1174426).\n- PCI/RCEC: Fix RCiEP device to RCEC association (git-fixes).\n- PCI/RCEC: Fix RCiEP device to RCEC association (jsc#SLE-13736 jsc#SLE-14845 git-fixes).\n- PCI/portdrv: Report reset for frozen channel (bsc#1174426).\n- PCI: Add a REBAR size quirk for Sapphire RX 5600 XT Pulse (git-fixes).\n- PCI: Add function 1 DMA alias quirk for Marvell 9215 SATA controller (git-fixes).\n- PCI: Allow VPD access for QLogic ISP2722 (git-fixes).\n- PCI: Fix pci_register_io_range() memory leak (git-fixes).\n- PCI: PM: Do not read power state in pci_enable_device_flags() (git-fixes).\n- PCI: Release OF node in pci_scan_device()\u0027s error path (git-fixes).\n- PCI: designware-ep: Fix the Header Type check (git-fixes).\n- PCI: dwc: Move iATU detection earlier (git-fixes).\n- PCI: endpoint: Fix missing destroy_workqueue() (git-fixes).\n- PCI: iproc: Fix return value of iproc_msi_irq_domain_alloc() (git-fixes).\n- PCI: keystone: Let AM65 use the pci_ops defined in pcie-designware-host.c (git-fixes).\n- PCI: mediatek: Add missing of_node_put() to fix reference leak (git-fixes).\n- PCI: tegra: Fix ASPM-L1SS advertisement disable code (git-fixes).\n- PCI: tegra: Move \u0027dbi\u0027 accesses to post common DWC initialization (git-fixes).\n- PCI: thunder: Fix compile testing (git-fixes).\n- PCI: xgene-msi: Fix race in installing chained irq handler (git-fixes).\n- PM / devfreq: Use more accurate returned new_freq as resume_freq (git-fixes).\n- PM: EM: postpone creating the debugfs dir till fs_initcall (git-fixes).\n- PM: runtime: Add documentation for pm_runtime_resume_and_get() (git-fixes).\n- PM: runtime: Add pm_runtime_resume_and_get to deal with usage counter (bsc#1183366).\n- PM: runtime: Fix ordering in pm_runtime_get_suppliers() (git-fixes).\n- PM: runtime: Fix ordering in pm_runtime_get_suppliers() (git-fixes).\n- PM: runtime: Fix race getting/putting suppliers at probe (git-fixes).\n- Platform: OLPC: Fix probe error handling (git-fixes).\n- RAS/CEC: Correct ce_add_elem()\u0027s returned values (bsc#1152489).\n- RDMA/addr: create addr_wq with WQ_MEM_RECLAIM flag (bsc#1183346).\n- RDMA/cm: Fix IRQ restore in ib_send_cm_sidr_rep (jsc#SLE-15176).\n- RDMA/core: create ib_cm with WQ_MEM_RECLAIM flag (bsc#1183346).\n- RDMA/hns: Delete redundant abnormal interrupt status (git-fixes).\n- RDMA/hns: Delete redundant condition judgment related to eq (git-fixes).\n- RDMA/mlx5: Fix drop packet rule in egress table (jsc#SLE-15175).\n- RDMA/qedr: Fix error return code in qedr_iw_connect() (jsc#SLE-8215).\n- RDMA/rtrs-clt: Close rtrs client conn before destroying rtrs clt session files (jsc#SLE-15176).\n- RDMA/rtrs-clt: destroy sysfs after removing session from active list (jsc#SLE-15176).\n- RDMA/srp: Fix support for unpopulated and unbalanced NUMA nodes (bsc#1169709)\n- RDMA/srp: Fix support for unpopulated and unbalanced NUMA nodes (bsc#1169709)\n- RDMA/srpt: Fix error return code in srpt_cm_req_recv() (git-fixes).\n- Re-enable yenta socket driver for x86_64 (bsc#1186349)\n- SUNRPC in case of backlog, hand free slots directly to waiting task (bsc#1185428).\n- SUNRPC: More fixes for backlog congestion (bsc#1185428).\n- USB: Add LPM quirk for Lenovo ThinkPad USB-C Dock Gen2 Ethernet (git-fixes).\n- USB: Add reset-resume quirk for WD19\u0027s Realtek Hub (git-fixes).\n- USB: CDC-ACM: fix poison/unpoison imbalance (bsc#1184984).\n- USB: CDC-ACM: fix poison/unpoison imbalance (git-fixes).\n- USB: cdc-acm: downgrade message to debug (git-fixes).\n- USB: cdc-acm: fix TIOCGSERIAL implementation (git-fixes).\n- USB: cdc-acm: fix double free on probe failure (git-fixes).\n- USB: cdc-acm: fix unprivileged TIOCCSERIAL (git-fixes).\n- USB: cdc-acm: fix use-after-free after probe failure (git-fixes).\n- USB: cdc-acm: untangle a circular dependency between callback and softint (git-fixes).\n- USB: gadget: u_ether: Fix a configfs return code (git-fixes).\n- USB: gadget: udc: fix wrong pointer passed to IS_ERR() and PTR_ERR() (git-fixes).\n- USB: quirks: ignore remote wake-up on Fibocom L850-GL LTE modem (git-fixes).\n- USB: replace hardcode maximum usb string length by definition (git-fixes).\n- USB: serial: ark3116: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: ch341: add new Product ID (git-fixes).\n- USB: serial: cp210x: add ID for Acuity Brands nLight Air Adapter (git-fixes).\n- USB: serial: cp210x: add some more GE USB IDs (git-fixes).\n- USB: serial: f81232: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: f81534: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: fix return value for unsupported ioctls (git-fixes).\n- USB: serial: io_edgeport: fix memory leak in edge_startup (git-fixes).\n- USB: serial: mos7720: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: opticon: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: pl2303: add support for PL2303HXN (bsc#1186320).\n- USB: serial: pl2303: fix line-speed handling on newer chips (bsc#1186320).\n- USB: serial: quatech2: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: ssu100: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: ti_usb_3410_5052: fix TIOCSSERIAL permission check (git-fixes).\n- USB: serial: usb_wwan: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: usb_wwan: fix TIOCSSERIAL jiffies conversions (git-fixes).\n- USB: serial: usb_wwan: fix unprivileged TIOCCSERIAL (git-fixes).\n- USB: trancevibrator: fix control-request direction (git-fixes).\n- USB: usblp: fix a hang in poll() if disconnected (git-fixes).\n- Update config files. (bsc#1185010)\n- amd/amdgpu: Disable VCN DPG mode for Picasso (git-fixes).\n- amdgpu: avoid incorrect %hu format string (git-fixes).\n- apparmor: Fix aa_label refcnt leak in policy_update (git-fixes).\n- apparmor: check/put label on apparmor_sk_clone_security() (git-fixes).\n- appletalk: Fix skb allocation size in loopback case (git-fixes).\n- arm64/mm: Fix pfn_valid() for ZONE_DEVICE based memory (git-fixes).\n- arm64: Add missing ISB after invalidating TLB in __primary_switch (git-fixes).\n- arm64: avoid -Woverride-init warning (git-fixes).\n- arm64: kasan: fix page_alloc tagging with DEBUG_VIRTUAL (git-fixes).\n- arm64: kdump: update ppos when reading elfcorehdr (git-fixes).\n- arm64: kexec_file: fix memory leakage in create_dtb() when fdt_open_into() fails (git-fixes).\n- arm64: link with -z norelro for LLD or aarch64-elf (git-fixes).\n- arm64: link with -z norelro regardless of CONFIG_RELOCATABLE (git-fixes).\n- arm64: make STACKPROTECTOR_PER_TASK configurable (bsc#1181862).\n- arm64: ptrace: Fix seccomp of traced syscall -1 (NO_SYSCALL) (git-fixes).\n- arm64: ptrace: Use NO_SYSCALL instead of -1 in syscall_trace_enter() (git-fixes).\n- arm64: vdso32: make vdso32 install conditional (git-fixes).\n- arm: mm: use __pfn_to_section() to get mem_section (git-fixes).\n- ata: ahci: Disable SXS for Hisilicon Kunpeng920 (git-fixes).\n- ata: libahci_platform: fix IRQ check (git-fixes).\n- ath10k: Fix a use after free in ath10k_htc_send_bundle (git-fixes).\n- ath10k: Fix ath10k_wmi_tlv_op_pull_peer_stats_info() unlock without lock (git-fixes).\n- ath10k: fix wmi mgmt tx queue full due to race condition (git-fixes).\n- ath10k: hold RCU lock when calling ieee80211_find_sta_by_ifaddr() (git-fixes).\n- ath9k: Fix error check in ath9k_hw_read_revisions() for PCI devices (git-fixes).\n- ath9k: fix transmitting to stations in dynamic SMPS mode (git-fixes).\n- atl1c: fix error return code in atl1c_probe() (git-fixes).\n- atl1e: fix error return code in atl1e_probe() (git-fixes).\n- backlight: journada720: Fix Wmisleading-indentation warning (git-fixes).\n- batman-adv: initialize \u0027struct batadv_tvlv_tt_vlan_data\u0027-\u003ereserved field (git-fixes).\n- binfmt_misc: fix possible deadlock in bm_register_write (git-fixes).\n- binfmt_misc: fix possible deadlock in bm_register_write (git-fixes).\n- blk-iocost: ioc_pd_free() shouldn\u0027t assume irq disabled (git-fixes).\n- blk-mq: Swap two calls in blk_mq_exit_queue() (git-fixes).\n- blk-mq: plug request for shared sbitmap (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).\n- blk-mq: set default elevator as deadline in case of hctx shared tagset (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).\n- blkcg: fix memleak for iolatency (git-fixes).\n- block, bfq: set next_rq to waker_bfqq-\u003enext_rq in waker injection (bsc#1168838).\n- block/genhd: use atomic_t for disk_event-\u003eblock (bsc#1185497).\n- block: Fix three kernel-doc warnings (git-fixes).\n- block: fix get_max_io_size() (git-fixes).\n- block: recalculate segment count for multi-segment discards correctly (bsc#1184724).\n- block: rsxx: fix error return code of rsxx_pci_probe() (git-fixes).\n- block: rsxx: select CONFIG_CRC32 (git-fixes).\n- bluetooth: eliminate the potential race condition when removing the HCI controller (git-fixes).\n- bnxt_en: Fix RX consumer index logic in the error path (git-fixes).\n- bnxt_en: Fix RX consumer index logic in the error path (git-fixes).\n- bnxt_en: fix ternary sign extension bug in bnxt_show_temp() (git-fixes).\n- bnxt_en: reliably allocate IRQ table on reset to avoid crash (jsc#SLE-8371 bsc#1153274).\n- bnxt_en: reverse order of TX disable and carrier off (git-fixes).\n- bpf, sockmap: Fix sk-\u003eprot unhash op reset (bsc#1155518).\n- bpf,x64: Pad NOPs to make images converge more easily (bsc#1178163).\n- bpf: Add sanity check for upper ptr_limit (bsc#1183686 bsc#1183775).\n- bpf: Avoid warning when re-casting __bpf_call_base into __bpf_call_base_args (bsc#1155518).\n- bpf: Declare __bpf_free_used_maps() unconditionally (bsc#1155518).\n- bpf: Do not do bpf_cgroup_storage_set() for kuprobe/tp programs (bsc#1155518).\n- bpf: Enforce that struct_ops programs be GPL-only (bsc#1177028).\n- bpf: Fix 32 bit src register truncation on div/mod (bsc#1184170).\n- bpf: Fix an unitialized value in bpf_iter (bsc#1177028).\n- bpf: Fix leakage of uninitialized bpf stack under speculation (bsc#1155518).\n- bpf: Fix masking negation logic upon negative dst register (bsc#1155518).\n- bpf: Fix propagation of 32 bit unsigned bounds from 64 bit bounds (bsc#1177028).\n- bpf: Fix verifier jsgt branch analysis on max bound (bsc#1155518).\n- bpf: Refcount task stack in bpf_get_task_stack (bsc#1177028).\n- bpf: Remove MTU check in __bpf_skb_max_len (bsc#1155518).\n- bpf: Simplify alu_limit masking for pointer arithmetic (bsc#1183686 bsc#1183775).\n- bpf: link: Refuse non-O_RDWR flags in BPF_OBJ_GET (bsc#1177028).\n- bpf_lru_list: Read double-checked variable once without lock (bsc#1155518).\n- brcmfmac: Add DMI nvram filename quirk for Predia Basic tablet (git-fixes).\n- brcmfmac: Add DMI nvram filename quirk for Voyo winpad A15 tablet (git-fixes).\n- brcmfmac: clear EAP/association status bits on linkdown events (git-fixes).\n- bsg: free the request before return error code (git-fixes).\n- btrfs: abort the transaction if we fail to inc ref in btrfs_copy_root (bsc#1184217).\n- btrfs: always pin deleted leaves when there are active tree mod log users (bsc#1184224).\n- btrfs: fix exhaustion of the system chunk array due to concurrent allocations (bsc#1183386).\n- btrfs: fix extent buffer leak on failure to copy root (bsc#1184218).\n- btrfs: fix qgroup data rsv leak caused by falloc failure (bsc#1185549).\n- btrfs: fix race between swap file activation and snapshot creation (bsc#1185587).\n- btrfs: fix race between swap file activation and snapshot creation (bsc#1185587).\n- btrfs: fix race between transaction aborts and fsyncs leading to use-after-free (bsc#1186441).\n- btrfs: fix race between transaction aborts and fsyncs leading to use-after-free (bsc#1186441).\n- btrfs: fix race between writes to swap files and scrub (bsc#1185586).\n- btrfs: fix race between writes to swap files and scrub (bsc#1185586).\n- btrfs: fix race when cloning extent buffer during rewind of an old root (bsc#1184193).\n- btrfs: fix race when picking most recent mod log operation for an old root (bsc#1186439).\n- btrfs: fix race when picking most recent mod log operation for an old root (bsc#1186439).\n- btrfs: fix stale data exposure after cloning a hole with NO_HOLES enabled (bsc#1184220).\n- btrfs: fix subvolume/snapshot deletion not triggered on mount (bsc#1184219).\n- btrfs: track qgroup released data in own variable in insert_prealloc_file_extent (bsc#1185549).\n- bus: fsl-mc: add the dpdbg device type (bsc#1185670).\n- bus: fsl-mc: list more commands as accepted through the ioctl (bsc#1185670).\n- bus: omap_l3_noc: mark l3 irqs as IRQF_NO_THREAD (git-fixes).\n- bus: qcom: Put child node before return (git-fixes).\n- bus: ti-sysc: Fix warning on unbind if reset is not deasserted (git-fixes).\n- can: c_can: move runtime PM enable/disable to c_can_platform (git-fixes).\n- can: c_can_pci: c_can_pci_remove(): fix use-after-free (git-fixes).\n- can: flexcan: assert FRZ bit in flexcan_chip_freeze() (git-fixes).\n- can: flexcan: enable RX FIFO after FRZ/HALT valid (git-fixes).\n- can: flexcan: flexcan_chip_freeze(): fix chip freeze for missing bitrate (git-fixes).\n- can: flexcan: invoke flexcan_chip_freeze() to enter freeze mode (git-fixes).\n- can: m_can: m_can_do_rx_poll(): fix extraneous msg loss warning (git-fixes).\n- can: peak_usb: Revert \u0027can: peak_usb: add forgotten supported devices\u0027 (git-fixes).\n- can: peak_usb: add forgotten supported devices (git-fixes).\n- can: skb: can_skb_set_owner(): fix ref counting if socket was closed before setting skb ownership (git-fixes).\n- cdc-acm: fix BREAK rx code path adding necessary calls (git-fixes).\n- cdc-wdm: untangle a circular dependency between callback and softint (git-fixes).\n- cdrom: gdrom: deallocate struct gdrom_unit fields in remove_gdrom (git-fixes).\n- cdrom: gdrom: initialize global variable at init time (git-fixes).\n- ceph: do not clobber i_snap_caps on non-I_NEW inode (bsc#1186501).\n- ceph: do not clobber i_snap_caps on non-I_NEW inode (bsc#1186501).\n- ceph: fix inode leak on getattr error in __fh_to_dentry (bsc#1186501).\n- ceph: fix inode leak on getattr error in __fh_to_dentry (bsc#1186501).\n- ceph: fix up error handling with snapdirs (bsc#1186501).\n- ceph: fix up error handling with snapdirs (bsc#1186501).\n- ceph: only check pool permissions for regular files (bsc#1186501).\n- ceph: only check pool permissions for regular files (bsc#1186501).\n- cfg80211: remove WARN_ON() in cfg80211_sme_connect (git-fixes).\n- cfg80211: scan: drop entry from hidden_list on overflow (git-fixes).\n- ch_ktls: Fix kernel panic (jsc#SLE-15131).\n- ch_ktls: do not send snd_una update to TCB in middle (jsc#SLE-15131).\n- ch_ktls: fix device connection close (jsc#SLE-15131).\n- ch_ktls: fix enum-conversion warning (jsc#SLE-15129).\n- ch_ktls: tcb close causes tls connection failure (jsc#SLE-15131).\n- cifs: New optype for session operations (bsc#1181507).\n- cifs: Tracepoints and logs for tracing credit changes (bsc#1181507).\n- cifs: change noisy error message to FYI (bsc#1181507).\n- cifs: check pointer before freeing (bsc#1183534).\n- cifs: do not send close in compound create+close requests (bsc#1181507).\n- cifs: print MIDs in decimal notation (bsc#1181507).\n- cifs: return proper error code in statfs(2) (bsc#1181507).\n- cifs_debug: use %pd instead of messing with -\u003ed_name (bsc#1181507).\n- clk: exynos7: Mark aclk_fsys1_200 as critical (git-fixes).\n- clk: fix invalid usage of list cursor in register (git-fixes).\n- clk: fix invalid usage of list cursor in unregister (git-fixes).\n- clk: mvebu: armada-37xx-periph: Fix switching CPU freq from 250 Mhz to 1 GHz (git-fixes).\n- clk: mvebu: armada-37xx-periph: Fix workaround for switching from L1 to L0 (git-fixes).\n- clk: mvebu: armada-37xx-periph: remove .set_parent method for CPU PM clock (git-fixes).\n- clk: qcom: a53-pll: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- clk: socfpga: arria10: Fix memory leak of socfpga_clk on error return (git-fixes).\n- clk: socfpga: fix iomem pointer cast on 64-bit (git-fixes).\n- clk: uniphier: Fix potential infinite loop (git-fixes).\n- clk: zynqmp: move zynqmp_pll_set_mode out of round_rate callback (git-fixes).\n- completion: Drop init_completion define (git-fixes).\n- configfs: fix a use-after-free in __configfs_open_file (git-fixes).\n- coresight: etm4x: Fix issues on trcseqevr access (git-fixes).\n- coresight: etm4x: Fix save and restore of TRCVMIDCCTLR1 register (git-fixes).\n- coresight: remove broken __exit annotations (git-fixes).\n- coresight: tmc-etr: Fix barrier packet insertion for perf buffer (git-fixes).\n- cpufreq: Kconfig: fix documentation links (git-fixes).\n- cpufreq: armada-37xx: Fix determining base CPU frequency (git-fixes).\n- cpufreq: armada-37xx: Fix driver cleanup when registration failed (git-fixes).\n- cpufreq: armada-37xx: Fix setting TBG parent for load levels (git-fixes).\n- cpufreq: armada-37xx: Fix the AVS value for load L1 (git-fixes).\n- cpufreq: intel_pstate: Add Icelake servers support in no-HWP mode (bsc#1185758).\n- cpuidle/pseries: Fixup CEDE0 latency only for POWER10 onwards (bsc#1185550 ltc#192610).\n- crypto: api - check for ERR pointers in crypto_destroy_tfm() (git-fixes).\n- crypto: arm/curve25519 - Move \u0027.fpu\u0027 after \u0027.arch\u0027 (git-fixes).\n- crypto: chelsio - Read rxchannel-id from firmware (git-fixes).\n- crypto: mips/poly1305 - enable for all MIPS processors (git-fixes).\n- crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init (git-fixes).\n- crypto: qat - Fix a double free in adf_create_ring (git-fixes).\n- crypto: qat - do not release uninitialized resources (git-fixes).\n- crypto: qat - fix error path in adf_isr_resource_alloc() (git-fixes).\n- crypto: qat - fix unmap invalid dma address (git-fixes).\n- crypto: rng - fix crypto_rng_reset() refcounting when !CRYPTO_STATS (git-fixes).\n- crypto: stm32/cryp - Fix PM reference leak on stm32-cryp.c (git-fixes).\n- crypto: stm32/hash - Fix PM reference leak on stm32-hash.c (git-fixes).\n- crypto: tcrypt - avoid signed overflow in byte count (git-fixes).\n- cxgb4/chtls/cxgbit: Keeping the max ofld immediate data size same in cxgb4 and ulds (git-fixes).\n- cxgb4/chtls/cxgbit: Keeping the max ofld immediate data size same in cxgb4 and ulds (git-fixes).\n- cxgb4: Fix unintentional sign extension issues (git-fixes).\n- cxgb4: avoid collecting SGE_QBASE regs during traffic (git-fixes).\n- dm era: Fix bitset memory leaks (git-fixes).\n- dm era: Recover committed writeset after crash (git-fixes).\n- dm era: Reinitialize bitset cache before digesting a new writeset (git-fixes).\n- dm era: Update in-core bitset after committing the metadata (git-fixes).\n- dm era: Use correct value size in equality function of writeset tree (git-fixes).\n- dm era: Verify the data block size hasn\u0027t changed (git-fixes).\n- dm era: only resize metadata in preresume (git-fixes).\n- dm integrity: fix error reporting in bitmap mode after creation (git-fixes).\n- dm ioctl: fix error return code in target_message (git-fixes).\n- dm mpath: fix racey management of PG initialization (git-fixes).\n- dm mpath: switch paths in dm_blk_ioctl() code path (bsc#1167574, bsc#1175995, bsc#1184485).\n- dm raid: fix discard limits for raid1 (git-fixes).\n- dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails (bsc#1185581).\n- dm writecache: fix the maximum number of arguments (git-fixes).\n- dm writecache: handle DAX to partitions on persistent memory correctly (git-fixes).\n- dm writecache: remove BUG() and fail gracefully instead (git-fixes).\n- dm zoned: select CONFIG_CRC32 (git-fixes).\n- dm: avoid filesystem lookup in dm_get_dev_t() (git-fixes).\n- dm: eliminate potential source of excessive kernel log noise (git-fixes).\n- dm: fix bug with RCU locking in dm_blk_report_zones (git-fixes).\n- dm: remove invalid sparse __acquires and __releases annotations (git-fixes).\n- dmaengine: Fix a double free in dma_async_device_register (git-fixes).\n- dmaengine: dw-edma: Fix crash on loading/unloading driver (git-fixes).\n- dmaengine: dw: Make it dependent to HAS_IOMEM (git-fixes).\n- dmaengine: idxd: Fix clobbering of SWERR overflow bit on writeback (git-fixes).\n- dmaengine: idxd: Fix potential null dereference on pointer status (git-fixes).\n- dmaengine: idxd: cleanup pci interrupt vector allocation management (git-fixes).\n- dmaengine: idxd: clear MSIX permission entry on shutdown (git-fixes).\n- dmaengine: idxd: fix cdev setup and free device lifetime issues (git-fixes).\n- dmaengine: idxd: fix delta_rec and crc size field for completion record (git-fixes).\n- dmaengine: idxd: fix dma device lifetime (git-fixes).\n- dmaengine: idxd: fix opcap sysfs attribute output (git-fixes).\n- dmaengine: idxd: fix wq cleanup of WQCFG registers (git-fixes).\n- dmaengine: idxd: fix wq size store permission state (git-fixes).\n- dmaengine: idxd: removal of pcim managed mmio mapping (git-fixes).\n- docs: kernel-parameters: Add gpio_mockup_named_lines (git-fixes).\n- docs: kernel-parameters: Move gpio-mockup for alphabetic order (git-fixes).\n- dpaa_eth: Remove unnecessary boolean expression in dpaa_get_headroom (git-fixes).\n- dpaa_eth: Use random MAC address when none is given (bsc#1184811).\n- dpaa_eth: copy timestamp fields to new skb in A-050385 workaround (git-fixes).\n- dpaa_eth: fix the RX headroom size alignment (git-fixes).\n- dpaa_eth: update the buffer layout for non-A050385 erratum scenarios (git-fixes).\n- drivers: hv: Fix whitespace errors (bsc#1185725).\n- drivers: net: xgene: Fix the order of the arguments of \u0027alloc_etherdev_mqs()\u0027 (git-fixes).\n- drivers: video: fbcon: fix NULL dereference in fbcon_cursor() (git-fixes).\n- drivers: video: fbcon: fix NULL dereference in fbcon_cursor() (git-fixes).\n- drm/amd/display/dc/dce/dce_aux: Remove duplicate line causing \u0027field overwritten\u0027 issue (git-fixes).\n- drm/amd/display: Check for DSC support instead of ASIC revision (git-fixes).\n- drm/amd/display: Correct algorithm for reversed gamma (git-fixes).\n- drm/amd/display: DCHUB underflow counter increasing in some scenarios (git-fixes).\n- drm/amd/display: Do not optimize bandwidth before disabling planes (git-fixes).\n- drm/amd/display: Fix UBSAN warning for not a valid value for type \u0027_Bool\u0027 (git-fixes).\n- drm/amd/display: Fix UBSAN: shift-out-of-bounds warning (git-fixes).\n- drm/amd/display: Fix debugfs link_settings entry (git-fixes).\n- drm/amd/display: Fix nested FPU context in dcn21_validate_bandwidth() (git-fixes).\n- drm/amd/display: Fix off by one in hdmi_14_process_transaction() (git-fixes).\n- drm/amd/display: Fix two cursor duplication when using overlay (git-fixes).\n- drm/amd/display: Force vsync flip when reconfiguring MPCC (git-fixes).\n- drm/amd/display: Guard against NULL pointer deref when get_i2c_info fails (git-fixes).\n- drm/amd/display: Initialize attribute for hdcp_srm sysfs file (git-fixes).\n- drm/amd/display: Reject non-zero src_y and src_x for video planes (git-fixes).\n- drm/amd/display: Revert dram_clock_change_latency for DCN2.1 (git-fixes).\n- drm/amd/display: Try YCbCr420 color when YCbCr444 fails (git-fixes).\n- drm/amd/display: add handling for hdcp2 rx id list validation (git-fixes).\n- drm/amd/display: changing sr exit latency (git-fixes).\n- drm/amd/display: fix dml prefetch validation (git-fixes).\n- drm/amd/display: fixed divide by zero kernel crash during dsc enablement (git-fixes).\n- drm/amd/display: turn DPMS off on connector unplug (git-fixes).\n- drm/amd/pm: fix workload mismatch on vega10 (git-fixes).\n- drm/amd/powerplay: fix spelling mistake \u0027smu_state_memroy_block\u0027 (bsc#1152489) \n- drm/amdgpu : Fix asic reset regression issue introduce by 8f211fe8ac7c4f (git-fixes).\n- drm/amdgpu/display/dm: add missing parameter documentation (git-fixes).\n- drm/amdgpu/display: buffer INTERRUPT_LOW_IRQ_CONTEXT interrupt work (git-fixes).\n- drm/amdgpu/display: remove redundant continue statement (git-fixes).\n- drm/amdgpu/display: restore AUX_DPHY_TX_CONTROL for DCN2.x (git-fixes).\n- drm/amdgpu/display: use GFP_ATOMIC in dcn21_validate_bandwidth_fp() (git-fixes).\n- drm/amdgpu/swsmu: add interrupt work function (git-fixes).\n- drm/amdgpu/swsmu: add interrupt work handler for smu11 parts (git-fixes).\n- drm/amdgpu: Add additional Sienna Cichlid PCI ID (git-fixes).\n- drm/amdgpu: Add check to prevent IH overflow (git-fixes).\n- drm/amdgpu: Add mem sync flag for IB allocated by SA (git-fixes).\n- drm/amdgpu: Fix GPU TLB update error when PAGE_SIZE \u003e AMDGPU_PAGE_SIZE (git-fixes).\n- drm/amdgpu: Fix some unload driver issues (git-fixes).\n- drm/amdgpu: Init GFX10_ADDR_CONFIG for VCN v3 in DPG mode (git-fixes).\n- drm/amdgpu: check alignment on CPU page for bo map (git-fixes).\n- drm/amdgpu: disable 3DCGCG on picasso/raven1 to avoid compute hang (git-fixes).\n- drm/amdgpu: fb BO should be ttm_bo_type_device (git-fixes).\n- drm/amdgpu: fix NULL pointer dereference (git-fixes).\n- drm/amdgpu: fix concurrent VM flushes on Vega/Navi v2 (git-fixes).\n- drm/amdgpu: fix offset calculation in amdgpu_vm_bo_clear_mappings() (git-fixes).\n- drm/amdgpu: fix parameter error of RREG32_PCIE() in amdgpu_regs_pcie (git-fixes).\n- drm/amdgpu: mask the xgmi number of hops reported from psp to kfd (git-fixes).\n- drm/amdgpu: remove unused variable from struct amdgpu_bo (git-fixes).\n- drm/amdgpu: update gc golden setting for Navi12 (git-fixes).\n- drm/amdgpu: update sdma golden setting for Navi12 (git-fixes).\n- drm/amdkfd: Fix UBSAN shift-out-of-bounds warning (git-fixes).\n- drm/amdkfd: Fix cat debugfs hang_hws file causes system crash bug (git-fixes).\n- drm/amdkfd: Put ACPI table after using it (bsc#1152489) Backporting notes: \t* context changes\n- drm/amdkfd: dqm fence memory corruption (git-fixes).\n- drm/amdkfd: fix build error with AMD_IOMMU_V2=m (git-fixes).\n- drm/ast: AST2500 fixups (bsc#1174416).\n- drm/ast: AST2500 fixups (bsc#1174416).\n- drm/ast: Add 25MHz refclk support (bsc#1174416).\n- drm/ast: Add 25MHz refclk support (bsc#1174416).\n- drm/ast: Add support for 1152x864 mode (bsc#1174416).\n- drm/ast: Add support for 1152x864 mode (bsc#1174416).\n- drm/ast: Add support for AIP200 (bsc#1174416).\n- drm/ast: Add support for AIP200 (bsc#1174416).\n- drm/ast: Correct mode table for AST2500 precatch (bsc#1174416).\n- drm/ast: Correct mode table for AST2500 precatch (bsc#1174416).\n- drm/ast: Disable VGA decoding while driver is active (bsc#1174416).\n- drm/ast: Disable VGA decoding while driver is active (bsc#1174416).\n- drm/ast: Disable screen on register init (bsc#1174416).\n- drm/ast: Disable screen on register init (bsc#1174416).\n- drm/ast: Fix P2A config detection (bsc#1174416).\n- drm/ast: Fix P2A config detection (bsc#1174416).\n- drm/ast: Fix invalid usage of AST_MAX_HWC_WIDTH in cursor atomic_check (git-fixes).\n- drm/ast: Fix register access in non-P2A mode for DP501 (bsc#1174416).\n- drm/ast: Fix register access in non-P2A mode for DP501 (bsc#1174416).\n- drm/ast: Keep MISC fields when enabling VGA (bsc#1174416).\n- drm/ast: Keep MISC fields when enabling VGA (bsc#1174416).\n- drm/ast: drm/ast: Fix boot address for AST2500 (bsc#1174416).\n- drm/ast: drm/ast: Fix boot address for AST2500 (bsc#1174416).\n- drm/compat: Clear bounce structures (git-fixes).\n- drm/dp_mst: Revise broadcast msg lct \u0026 lcr (git-fixes).\n- drm/dp_mst: Set CLEAR_PAYLOAD_ID_TABLE as broadcast (git-fixes).\n- drm/hisilicon: Fix use-after-free (git-fixes).\n- drm/i915/display: fix compiler warning about array overrun (git-fixes).\n- drm/i915/gt: Clear CACHE_MODE prior to clearing residuals (git-fixes).\n- drm/i915/gt: Disable HiZ Raw Stall Optimization on broken gen7 (git-fixes).\n- drm/i915/gvt: Fix error code in intel_gvt_init_device() (git-fixes).\n- drm/i915/gvt: Set SNOOP for PAT3 on BXT/APL to workaround GPU BB hang (git-fixes).\n- drm/i915/overlay: Fix active retire callback alignment (git-fixes).\n- drm/i915/selftests: Fix some error codes (git-fixes).\n- drm/i915: Avoid div-by-zero on gen2 (git-fixes).\n- drm/i915: Fix ICL MG PHY vswing handling (git-fixes).\n- drm/i915: Fix crash in auto_retire (git-fixes).\n- drm/i915: Fix invalid access to ACPI _DSM objects (bsc#1184074).\n- drm/i915: Hold onto an explicit ref to i915_vma_work.pinned (git-fixes).\n- drm/i915: Read C0DRB3/C1DRB3 as 16 bits again (git-fixes).\n- drm/i915: Wedge the GPU if command parser setup fails (git-fixes).\n- drm/imx: imx-ldb: fix out of bounds array access warning (git-fixes).\n- drm/ingenic: Fix non-OSD mode (git-fixes).\n- drm/ingenic: Register devm action to cleanup encoders (git-fixes).\n- drm/komeda: Fix bit check to import to value of proper type (git-fixes).\n- drm/lima: fix reference leak in lima_pm_busy (git-fixes).\n- drm/mcde/panel: Inverse misunderstood flag (git-fixes).\n- drm/mediatek: Fix aal size config (bsc#1152489) Backporting notes: \t* replaced mtk_ddp_write() with writel()\n- drm/meson: fix shutdown crash when component not probed (git-fixes).\n- drm/msm/a5xx: Remove overwriting A5XX_PC_DBG_ECO_CNTL register (git-fixes).\n- drm/msm/adreno: a5xx_power: Do not apply A540 lm_setup to other GPUs (git-fixes).\n- drm/msm/gem: Add obj-\u003elock wrappers (bsc#1152489) Backporting notes: \t* taken for 9b73bde39cf2 (\u0027drm/msm: Fix use-after-free in msm_gem with carveout\u0027) \t* context changes\n- drm/msm/mdp5: Configure PP_SYNC_HEIGHT to double the vtotal (git-fixes).\n- drm/msm/mdp5: Do not multiply vclk line count by 100 (git-fixes).\n- drm/msm: Fix WARN_ON() splat in _free_object() (bsc#1152489) Backporting notes: \t* context changes\n- drm/msm: Fix a5xx/a6xx timestamps (git-fixes).\n- drm/msm: Fix races managing the OOB state for timestamp vs (bsc#1152489) Backporting notes: \t* context changes\n- drm/msm: Fix suspend/resume on i.MX5 (git-fixes).\n- drm/msm: Fix use-after-free in msm_gem with carveout (bsc#1152489) Backporting notes: \t* context changes\n- drm/msm: Ratelimit invalid-fence message (git-fixes).\n- drm/msm: Set drvdata to NULL when msm_drm_init() fails (git-fixes).\n- drm/msm: fix shutdown hook in case GPU components failed to bind (git-fixes).\n- drm/nouveau/kms/nv50-: Get rid of bogus nouveau_conn_mode_valid() (git-fixes).\n- drm/nouveau: bail out of nouveau_channel_new if channel init fails (bsc#1152489)\n- drm/omap: fix misleading indentation in pixinc() (git-fixes).\n- drm/panfrost: Clear MMU irqs before handling the fault (git-fixes).\n- drm/panfrost: Do not corrupt the queue mutex on open/close (bsc#1152472) Backporting notes: \t* context changes\n- drm/panfrost: Do not try to map pages that are already mapped (git-fixes).\n- drm/panfrost: Fix job timeout handling (bsc#1152472) Backporting notes: \t* context changes\n- drm/panfrost: Remove unused variables in panfrost_job_close() (bsc#1152472)\n- drm/probe-helper: Check epoch counter in output_poll_execute() (git-fixes).\n- drm/qxl: do not run release if qxl failed to init (git-fixes).\n- drm/radeon/dpm: Disable sclk switching on Oland when two 4K 60Hz monitors are connected (git-fixes).\n- drm/radeon: Avoid power table parsing memory leaks (git-fixes).\n- drm/radeon: Fix a missing check bug in radeon_dp_mst_detect() (git-fixes).\n- drm/radeon: Fix off-by-one power_state index heap overwrite (git-fixes).\n- drm/radeon: fix AGP dependency (git-fixes).\n- drm/radeon: fix copy of uninitialized variable back to userspace (git-fixes).\n- drm/shmem-helper: Check for purged buffers in fault handler (git-fixes).\n- drm/shmem-helper: Do not remove the offset in vm_area_struct pgoff (git-fixes).\n- drm/shmem-helpers: vunmap: Do not put pages for dma-buf (git-fixes).\n- drm/sun4i: tcon: fix inverted DCLK polarity (bsc#1152489) Backporting notes: \t* context changes\n- drm/tegra: Fix reference leak when pm_runtime_get_sync() fails (git-fixes).\n- drm/tegra: dc: Do not set PLL clock to 0Hz (git-fixes).\n- drm/tegra: dc: Restore coupling of display controllers (git-fixes).\n- drm/tegra: sor: Grab runtime PM reference across reset (git-fixes).\n- drm/tilcdc: send vblank event when disabling crtc (git-fixes).\n- drm/vc4: crtc: Reduce PV fifo threshold on hvs4 (git-fixes).\n- drm/vc4: hdmi: Restore cec physical address on reconnect (bsc#1152472) Backporting notes: \t* context changes \t* change vc4_hdmi to vc4-\u003ehdmi \t* removed references to encoder-\u003ehdmi_monitor\n- drm/vkms: fix misuse of WARN_ON (git-fixes).\n- drm: Added orientation quirk for OneGX1 Pro (git-fixes).\n- drm: meson_drv add shutdown function (git-fixes).\n- drm: rcar-du: Fix PM reference leak in rcar_cmm_enable() (git-fixes).\n- drm: rcar-du: Fix crash when using LVDS1 clock for CRTC (bsc#1152489) Backporting notes: \t* context changes\n- drm: rcar-du: Fix leak of CMM platform device reference (git-fixes).\n- drm: xlnx: zynqmp: fix a memset in zynqmp_dp_train() (git-fixes).\n- e1000e: Fix duplicate include guard (git-fixes).\n- e1000e: Fix error handling in e1000_set_d0_lplu_state_82571 (git-fixes).\n- e1000e: add rtnl_lock() to e1000_reset_task (git-fixes).\n- efi: use 32-bit alignment for efi_guid_t literals (git-fixes).\n- enetc: Fix reporting of h/w packet counters (git-fixes).\n- enetc: Let the hardware auto-advance the taprio base-time of 0 (git-fixes).\n- enetc: Workaround for MDIO register access issue (git-fixes).\n- epoll: check for events when removing a timed out thread from the wait queue (git-fixes).\n- ethernet/netronome/nfp: Fix a use after free in nfp_bpf_ctrl_msg_rx (git-fixes).\n- ethernet: alx: fix order of calls on resume (git-fixes).\n- ethernet:enic: Fix a use after free bug in enic_hard_start_xmit (git-fixes).\n- ethtool: fix incorrect datatype in set_eee ops (bsc#1176447).\n- ethtool: fix missing NLM_F_MULTI flag when dumping (bsc#1176447).\n- ethtool: pause: make sure we init driver stats (jsc#SLE-15075).\n- exec: Move would_dump into flush_old_exec (git-fixes).\n- ext4: do not try to set xattr into ea_inode if value is empty (bsc#1184730).\n- ext4: find old entry again if failed to rename whiteout (bsc#1184742).\n- ext4: fix potential error in ext4_do_update_inode (bsc#1184731).\n- ext4: fix potential htree index checksum corruption (bsc#1184728).\n- extcon: Add stubs for extcon_register_notifier_all() functions (git-fixes).\n- extcon: Fix error handling in extcon_dev_register (git-fixes).\n- extcon: arizona: Fix some issues when HPDET IRQ fires after the jack has been unplugged (git-fixes).\n- extcon: arizona: Fix various races on driver unbind (git-fixes).\n- fbdev: zero-fill colormap in fbcmap.c (git-fixes).\n- fbmem: add margin check to fb_check_caps() (git-fixes).\n- firmware/efi: Fix a use after bug in efi_mem_reserve_persistent (git-fixes).\n- firmware: arm_scpi: Prevent the ternary sign expansion bug (git-fixes).\n- firmware: qcom-scm: Fix QCOM_SCM configuration (git-fixes).\n- firmware: qcom_scm: Fix kernel-doc function names to match (git-fixes).\n- firmware: qcom_scm: Make __qcom_scm_is_call_available() return bool (git-fixes).\n- firmware: qcom_scm: Reduce locking section for __get_convention() (git-fixes).\n- firmware: qcom_scm: Workaround lack of \u0027is available\u0027 call on SC7180 (git-fixes).\n- flow_dissector: fix byteorder of dissected ICMP ID (bsc#1154353).\n- fnic: use scsi_host_busy_iter() to traverse commands (bsc#1179851).\n- fotg210-udc: Complete OUT requests on short packets (git-fixes).\n- fotg210-udc: Do not DMA more than the buffer can take (git-fixes).\n- fotg210-udc: Fix DMA on EP0 for length \u003e max packet size (git-fixes).\n- fotg210-udc: Fix EP0 IN requests bigger than two packets (git-fixes).\n- fotg210-udc: Mask GRP2 interrupts we do not handle (git-fixes).\n- fotg210-udc: Remove a dubious condition leading to fotg210_done (git-fixes).\n- fs/epoll: restore waking from ep_done_scan() (bsc#1183868).\n- fs/jfs: fix potential integer overflow on shift of a int (bsc#1184741).\n- fs: direct-io: fix missing sdio-\u003eboundary (bsc#1184736).\n- fsl/fman: check dereferencing null pointer (git-fixes).\n- fsl/fman: fix dereference null return value (git-fixes).\n- fsl/fman: fix eth hash table allocation (git-fixes).\n- fsl/fman: fix unreachable code (git-fixes).\n- fsl/fman: reuse set_mac_address() in dtsec init() (bsc#1184811).\n- fsl/fman: tolerate missing MAC address in device tree (bsc#1184811).\n- fsl/fman: use 32-bit unsigned integer (git-fixes).\n- ftrace/x86: Tell objtool to ignore nondeterministic ftrace stack layout (bsc#1177028).\n- ftrace: Fix modify_ftrace_direct (bsc#1177028).\n- ftrace: Handle commands when closing set_ftrace_filter file (git-fixes).\n- fuse: fix bad inode (bsc#1184211).\n- fuse: fix bad inode (bsc#1184211).\n- fuse: fix live lock in fuse_iget() (bsc#1184211).\n- fuse: fix live lock in fuse_iget() (bsc#1184211).\n- fuse: fix write deadlock (bsc#1185573).\n- fuse: verify write return (git-fixes).\n- futex: Change utime parameter to be \u0027const ... *\u0027 (git-fixes).\n- futex: Do not apply time namespace adjustment on FUTEX_LOCK_PI (bsc#1164648).\n- futex: Get rid of the val2 conditional dance (git-fixes).\n- futex: Make syscall entry points less convoluted (git-fixes).\n- gcc-plugins: drop support for GCC \u0026lt;= 4.7 (bcs#1181862).\n- gcc-plugins: make it possible to disable CONFIG_GCC_PLUGINS again (bcs#1181862).\n- gcc-plugins: simplify GCC plugin-dev capability test (bsc#1181862).\n- geneve: do not modify the shared tunnel info when PMTU triggers an ICMP reply (bsc#1176447).\n- geneve: do not modify the shared tunnel info when PMTU triggers an ICMP reply (git-fixes).\n- genirq/irqdomain: Do not try to free an interrupt that has no (git-fixes)\n- genirq: Disable interrupts for force threaded handlers (git-fixes)\n- genirq: Reduce irqdebug cacheline bouncing (bsc#1185703 ltc#192641).\n- gianfar: Account for Tx PTP timestamp in the skb headroom (git-fixes).\n- gianfar: Fix TX timestamping with a stacked DSA driver (git-fixes).\n- gianfar: Handle error code at MAC address change (git-fixes).\n- gianfar: Replace skb_realloc_headroom with skb_cow_head for PTP (git-fixes).\n- gpio: omap: Save and restore sysconfig (git-fixes).\n- gpio: pca953x: Set IRQ type when handle Intel Galileo Gen 2 (git-fixes).\n- gpio: sysfs: Obey valid_mask (git-fixes).\n- gpio: xilinx: Correct kernel doc for xgpio_probe() (git-fixes).\n- gpio: zynq: fix reference leak in zynq_gpio functions (git-fixes).\n- gpiolib: Do not free if pin ranges are not defined (git-fixes).\n- gpiolib: acpi: Add missing IRQF_ONESHOT (git-fixes).\n- gpiolib: acpi: Add quirk to ignore EC wakeups on Dell Venue 10 Pro 5055 (git-fixes).\n- gpu/xen: Fix a use after free in xen_drm_drv_init (git-fixes).\n- hrtimer: Update softirq_expires_next correctly after (git-fixes)\n- hv_netvsc: Reset the RSC count if NVSP_STAT_FAIL in netvsc_receive() (git-fixes).\n- hwmon: (ina3221) Fix PM usage counter unbalance in ina3221_write_enable (git-fixes).\n- hwmon: (occ) Fix poll rate limiting (git-fixes).\n- i2c: Add I2C_AQ_NO_REP_START adapter quirk (git-fixes).\n- i2c: bail out early when RDWR parameters are wrong (git-fixes).\n- i2c: cadence: add IRQ check (git-fixes).\n- i2c: emev2: add IRQ check (git-fixes).\n- i2c: i801: Do not generate an interrupt on bus reset (git-fixes).\n- i2c: img-scb: fix reference leak when pm_runtime_get_sync fails (git-fixes).\n- i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails (git-fixes).\n- i2c: jz4780: add IRQ check (git-fixes).\n- i2c: mlxbf: add IRQ check (git-fixes).\n- i2c: omap: fix reference leak when pm_runtime_get_sync fails (git-fixes).\n- i2c: rcar: faster irq code to minimize HW race condition (git-fixes).\n- i2c: rcar: optimize cacheline to minimize HW race condition (git-fixes).\n- i2c: s3c2410: fix possible NULL pointer deref on read message after write (git-fixes).\n- i2c: sh7760: add IRQ check (git-fixes).\n- i2c: sh7760: fix IRQ error path (git-fixes).\n- i2c: sh_mobile: Use new clock calculation formulas for RZ/G2E (git-fixes).\n- i2c: sprd: fix reference leak when pm_runtime_get_sync fails (git-fixes).\n- i2c: tegra: Add missing pm_runtime_put() (bsc#1184386).\n- i2c: tegra: Check errors for both positive and negative values (bsc#1184386).\n- i2c: tegra: Clean up and improve comments (bsc#1184386).\n- i2c: tegra: Clean up printk messages (bsc#1184386).\n- i2c: tegra: Clean up probe function (bsc#1184386).\n- i2c: tegra: Clean up variable names (bsc#1184386).\n- i2c: tegra: Clean up variable types (bsc#1184386).\n- i2c: tegra: Clean up whitespaces, newlines and indentation (bsc#1184386).\n- i2c: tegra: Create i2c_writesl_vi() to use with VI I2C for filling TX FIFO (bsc#1184386).\n- i2c: tegra: Factor out error recovery from tegra_i2c_xfer_msg() (bsc#1184386).\n- i2c: tegra: Factor out hardware initialization into separate function (bsc#1184386).\n- i2c: tegra: Factor out packet header setup from tegra_i2c_xfer_msg() (bsc#1184386).\n- i2c: tegra: Factor out register polling into separate function (bsc#1184386).\n- i2c: tegra: Handle potential error of tegra_i2c_flush_fifos() (bsc#1184386).\n- i2c: tegra: Improve driver module description (bsc#1184386).\n- i2c: tegra: Improve formatting of variables (bsc#1184386).\n- i2c: tegra: Initialize div-clk rate unconditionally (bsc#1184386).\n- i2c: tegra: Make tegra_i2c_flush_fifos() usable in atomic transfer (bsc#1184386).\n- i2c: tegra: Mask interrupt in tegra_i2c_issue_bus_clear() (bsc#1184386).\n- i2c: tegra: Move out all device-tree parsing into tegra_i2c_parse_dt() (bsc#1184386).\n- i2c: tegra: Remove \u0027dma\u0027 variable from tegra_i2c_xfer_msg() (bsc#1184386).\n- i2c: tegra: Remove error message used for devm_request_irq() failure (bsc#1184386).\n- i2c: tegra: Remove i2c_dev.clk_divisor_non_hs_mode member (bsc#1184386).\n- i2c: tegra: Remove likely/unlikely from the code (bsc#1184386).\n- i2c: tegra: Remove outdated barrier() (bsc#1184386).\n- i2c: tegra: Remove redundant check in tegra_i2c_issue_bus_clear() (bsc#1184386).\n- i2c: tegra: Rename wait/poll functions (bsc#1184386).\n- i2c: tegra: Reorder location of functions in the code (bsc#1184386).\n- i2c: tegra: Runtime PM always available on Tegra (bsc#1184386).\n- i2c: tegra: Use clk-bulk helpers (bsc#1184386).\n- i2c: tegra: Use devm_platform_get_and_ioremap_resource() (bsc#1184386).\n- i2c: tegra: Use platform_get_irq() (bsc#1184386).\n- i2c: tegra: Use reset_control_reset() (bsc#1184386).\n- i2c: tegra: Use threaded interrupt (bsc#1184386).\n- i2c: tegra: Wait for config load atomically while in ISR (bsc#1184386).\n- i40e: Add zero-initialization of AQ command structures (git-fixes).\n- i40e: Added Asym_Pause to supported link modes (git-fixes).\n- i40e: Fix PHY type identifiers for 2.5G and 5G adapters (git-fixes).\n- i40e: Fix add TC filter for IPv6 (git-fixes).\n- i40e: Fix addition of RX filters after enabling FW LLDP agent (git-fixes).\n- i40e: Fix display statistics for veb_tc (git-fixes).\n- i40e: Fix endianness conversions (git-fixes).\n- i40e: Fix flow for IPv6 next header (extension header) (git-fixes).\n- i40e: Fix kernel oops when i40e driver removes VF\u0027s (git-fixes).\n- i40e: Fix overwriting flow control settings during driver loading (git-fixes).\n- i40e: Fix parameters in aq_get_phy_register() (jsc#SLE-8025).\n- i40e: Fix sparse error: \u0027vsi-\u003enetdev\u0027 could be null (jsc#SLE-8025).\n- i40e: Fix sparse error: uninitialized symbol \u0027ring\u0027 (jsc#SLE-13701).\n- i40e: Fix sparse errors in i40e_txrx.c (git-fixes).\n- i40e: Fix sparse errors in i40e_txrx.c (git-fixes).\n- i40e: Fix sparse warning: missing error code \u0027err\u0027 (git-fixes).\n- i40e: Fix use-after-free in i40e_client_subtask() (git-fixes).\n- i40e: fix broken XDP support (git-fixes).\n- i40e: fix the panic when running bpf in xdpdrv mode (git-fixes).\n- i40e: fix the restart auto-negotiation after FEC modified (git-fixes).\n- i915/perf: Start hrtimer only if sampling the OA buffer (git-fixes).\n- iavf: Fix incorrect adapter get in iavf_resume (git-fixes).\n- iavf: use generic power management (git-fixes).\n- ibmvfc: Avoid move login if fast fail is enabled (bsc#1185938 ltc#192043).\n- ibmvfc: Handle move login failure (bsc#1185938 ltc#192043).\n- ibmvfc: Reinit target retries (bsc#1185938 ltc#192043).\n- ibmvnic: add comments for spinlock_t definitions (bsc#1183871 ltc#192139).\n- ibmvnic: avoid calling napi_disable() twice (bsc#1065729).\n- ibmvnic: avoid multiple line dereference (bsc#1183871 ltc#192139).\n- ibmvnic: clean up the remaining debugfs data structures (bsc#1065729).\n- ibmvnic: correctly use dev_consume/free_skb_irq (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290 git-fixes).\n- ibmvnic: fix block comments (bsc#1183871 ltc#192139).\n- ibmvnic: fix braces (bsc#1183871 ltc#192139).\n- ibmvnic: fix miscellaneous checks (bsc#1183871 ltc#192139).\n- ibmvnic: improve failover sysfs entry (bsc#1043990 ltc#155681 git-fixes).\n- ibmvnic: merge do_change_param_reset into do_reset (bsc#1183871 ltc#192139).\n- ibmvnic: prefer \u0027unsigned long\u0027 over \u0027unsigned long int\u0027 (bsc#1183871 ltc#192139).\n- ibmvnic: prefer strscpy over strlcpy (bsc#1183871 ltc#192139).\n- ibmvnic: print adapter state as a string (bsc#1152457 ltc#174432 git-fixes).\n- ibmvnic: print reset reason as a string (bsc#1152457 ltc#174432 git-fixes).\n- ibmvnic: queue reset work in system_long_wq (bsc#1152457 ltc#174432 git-fixes).\n- ibmvnic: remove default label from to_string switch (bsc#1152457 ltc#174432 git-fixes).\n- ibmvnic: remove duplicate napi_schedule call in do_reset function (bsc#1065729).\n- ibmvnic: remove duplicate napi_schedule call in open function (bsc#1065729).\n- ibmvnic: remove unnecessary rmb() inside ibmvnic_poll (bsc#1183871 ltc#192139).\n- ibmvnic: remove unused spinlock_t stats_lock definition (bsc#1183871 ltc#192139).\n- ibmvnic: rework to ensure SCRQ entry reads are properly ordered (bsc#1183871 ltc#192139).\n- ice: Account for port VLAN in VF max packet size calculation (git-fixes).\n- ice: Account for port VLAN in VF max packet size calculation (git-fixes).\n- ice: Cleanup fltr list in case of allocation issues (git-fixes).\n- ice: Continue probe on link/PHY errors (jsc#SLE-12878).\n- ice: Fix for dereference of NULL pointer (git-fixes).\n- ice: Increase control queue timeout (git-fixes).\n- ice: Use port number instead of PF ID for WoL (jsc#SLE-12878).\n- ice: fix memory allocation call (jsc#SLE-12878).\n- ice: fix memory leak if register_netdev_fails (git-fixes).\n- ice: fix memory leak in ice_vsi_setup (git-fixes).\n- ice: fix memory leak of aRFS after resuming from suspend (jsc#SLE-12878).\n- ice: prevent ice_open and ice_stop during reset (git-fixes).\n- ice: remove DCBNL_DEVRESET bit from PF state (jsc#SLE-7926).\n- ics932s401: fix broken handling of errors when word reading fails (git-fixes).\n- igb: Fix duplicate include guard (git-fixes).\n- igb: XDP extack message on error (jsc#SLE-13536).\n- igb: XDP xmit back fix error code (jsc#SLE-13536).\n- igb: avoid premature Rx buffer reuse (jsc#SLE-13536).\n- igb: avoid transmit queue timeout in xdp path (jsc#SLE-13536).\n- igb: check timestamp validity (git-fixes).\n- igb: skb add metasize for xdp (jsc#SLE-13536).\n- igb: take VLAN double header into account (jsc#SLE-13536).\n- igb: use xdp_do_flush (jsc#SLE-13536).\n- igc: Fix Pause Frame Advertising (git-fixes).\n- igc: Fix Supported Pause Frame Link Setting (git-fixes).\n- igc: Fix igc_ptp_rx_pktstamp() (bsc#1160634).\n- igc: Fix igc_ptp_rx_pktstamp() (bsc#1160634).\n- igc: reinit_locked() should be called with rtnl_lock (git-fixes).\n- igc: reinit_locked() should be called with rtnl_lock (git-fixes).\n- iio: adc: ad7124: Fix missbalanced regulator enable / disable on error (git-fixes).\n- iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers (git-fixes).\n- iio: adc: ad7768-1: Fix too small buffer passed to iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: ad7793: Add missing error code in ad7793_setup() (git-fixes).\n- iio: adc: ad7949: fix wrong ADC result due to incorrect bit mask (git-fixes).\n- iio: adis16400: Fix an error code in adis16400_initial_setup() (git-fixes).\n- iio: gyro: fxas21002c: balance runtime power in error path (git-fixes).\n- iio: gyro: mpu3050: Fix error handling in mpu3050_trigger_handler (git-fixes).\n- iio: gyro: mpu3050: Fix reported temperature value (git-fixes).\n- iio: hid-sensor-humidity: Fix alignment issue of timestamp channel (git-fixes).\n- iio: hid-sensor-prox: Fix scale not correct issue (git-fixes).\n- iio: hid-sensor-temperature: Fix issues of timestamp channel (git-fixes).\n- iio: proximity: pulsedlight: Fix rumtime PM imbalance on error (git-fixes).\n- iio: tsl2583: Fix division by a zero lux_val (git-fixes).\n- iio:accel:adis16201: Fix wrong axis assignment that prevents loading (git-fixes).\n- iio:adc:qcom-spmi-vadc: add default scale to LR_MUX2_BAT_ID channel (git-fixes).\n- ima: Free IMA measurement buffer after kexec syscall (git-fixes).\n- include/linux/sched/mm.h: use rcu_dereference in in_vfork() (git-fixes).\n- intel_th: Consistency and off-by-one fix (git-fixes).\n- intel_th: pci: Add Alder Lake-M support (git-fixes).\n- intel_th: pci: Add Rocket Lake CPU support (git-fixes).\n- interconnect: core: fix error return code of icc_link_destroy() (git-fixes).\n- iommu/amd: Add support for map/unmap_resource (jsc#ECO-3482).\n- iommu/amd: Fix sleeping in atomic in increase_address_space() (bsc#1183277).\n- iommu/amd: Fix sleeping in atomic in increase_address_space() (bsc#1183310).\n- iommu/intel: Fix memleak in intel_irq_remapping_alloc (bsc#1183278).\n- iommu/intel: Fix memleak in intel_irq_remapping_alloc (bsc#1183312).\n- iommu/qcom: add missing put_device() call in qcom_iommu_of_xlate() (bsc#1183313).\n- iommu/qcom: add missing put_device() call in qcom_iommu_of_xlate() (bsc#1183637).\n- iommu/vt-d: Add get_domain_info() helper (bsc#1183279).\n- iommu/vt-d: Avoid panic if iommu init fails in tboot system (bsc#1183280).\n- iommu/vt-d: Avoid panic if iommu init fails in tboot system (bsc#1183315).\n- iommu/vt-d: Correctly check addr alignment in qi_flush_dev_iotlb_pasid() (bsc#1183281).\n- iommu/vt-d: Correctly check addr alignment in qi_flush_dev_iotlb_pasid() (bsc#1183316).\n- iommu/vt-d: Do not use flush-queue when caching-mode is on (bsc#1183282).\n- iommu/vt-d: Do not use flush-queue when caching-mode is on (bsc#1183317).\n- iommu/vt-d: Fix general protection fault in aux_detach_device() (bsc#1183283).\n- iommu/vt-d: Fix general protection fault in aux_detach_device() (bsc#1183318).\n- iommu/vt-d: Fix ineffective devTLB invalidation for subdevices (bsc#1183284).\n- iommu/vt-d: Fix ineffective devTLB invalidation for subdevices (bsc#1183319).\n- iommu/vt-d: Fix status code for Allocate/Free PASID command (bsc#1183320).\n- iommu/vt-d: Fix unaligned addresses for intel_flush_svm_range_dev() (bsc#1183285).\n- iommu/vt-d: Fix unaligned addresses for intel_flush_svm_range_dev() (bsc#1183321).\n- iommu/vt-d: Move intel_iommu info from struct intel_svm to struct intel_svm_dev (bsc#1183286).\n- iommu/vt-d: Move intel_iommu info from struct intel_svm to struct intel_svm_dev (bsc#1183322).\n- iommu/vt-d: Use device numa domain if RHSA is missing (bsc#1184585).\n- iommu: Check dev-\u003eiommu in dev_iommu_priv_get() before dereferencing it (bsc#1183311).\n- iommu: Switch gather-\u003eend to the inclusive end (bsc#1183314).\n- ionic: linearize tso skb with too many frags (bsc#1167773).\n- ionic: linearize tso skb with too many frags (bsc#1167773).\n- iopoll: introduce read_poll_timeout macro (git-fixes).\n- ipc/mqueue, msg, sem: Avoid relying on a stack reference past its expiry (bsc#1185988).\n- ipmi/watchdog: Stop watchdog timer when the current action is \u0027none\u0027 (bsc#1184855).\n- ipw2x00: potential buffer overflow in libipw_wx_set_encodeext() (git-fixes).\n- irqchip/ls-extirq: Add LS1043A, LS1088A external interrupt support (bsc#1184264).\n- irqchip/ls-extirq: Add LS1043A, LS1088A external interrupt support (bsc#1185233).\n- irqchip/ls-extirq: add IRQCHIP_SKIP_SET_WAKE to the irqchip flags (bsc#1184264).\n- irqchip/ls-extirq: add IRQCHIP_SKIP_SET_WAKE to the irqchip flags (bsc#1185233).\n- irqchip: Add support for Layerscape external interrupt lines (bsc#1185233).\n- isofs: release buffer head before return (bsc#1182613).\n- iwlwifi: add support for Qu with AX201 device (git-fixes).\n- iwlwifi: pcie: make cfg vs. trans_cfg more robust (git-fixes).\n- ixgbe: fail to create xfrm offload of IPsec tunnel mode SA (git-fixes).\n- ixgbe: fix unbalanced device enable/disable in suspend/resume (jsc#SLE-13706).\n- jffs2: fix use after free in jffs2_sum_write_data() (bsc#1184740).\n- kABI: Fix kABI caused by fixes for bsc#1174426 (bsc#1174426).\n- kABI: cover up change in struct kvm_arch (bsc#1184969).\n- kABI: powerpc/pmem: Include pmem prototypes (bsc#1113295 git-fixes).\n- kABI: powerpc/pseries: Add shutdown() to vio_driver and vio_bus (bsc#1184209 ltc#190917).\n- kABI: repair after \u0027nVMX: Properly handle userspace interrupt window request\u0027 \n- kbuild: Fail if gold linker is detected (bcs#1181862).\n- kbuild: add dummy toolchains to enable all cc-option etc. in Kconfig (bcs#1181862).\n- kbuild: change *FLAGS_\u0026lt;basetarget\u003e.o to take the path relative to $(obj) (bcs#1181862).\n- kbuild: dummy-tools, fix inverted tests for gcc (bcs#1181862).\n- kbuild: dummy-tools, support MPROFILE_KERNEL checks for ppc (bsc#1181862).\n- kbuild: improve cc-option to clean up all temporary files (bsc#1178330).\n- kbuild: include scripts/Makefile.* only when relevant CONFIG is enabled (bcs#1181862).\n- kbuild: simplify GCC_PLUGINS enablement in dummy-tools/gcc (bcs#1181862).\n- kbuild: stop filtering out $(GCC_PLUGINS_CFLAGS) from cc-option base (bcs#1181862).\n- kbuild: use -S instead of -E for precise cc-option test in Kconfig (bsc#1178330).\n- kconfig: introduce m32-flag and m64-flag (bcs#1181862).\n- kernel-docs.spec.in: Build using an utf-8 locale. Sphinx cannot handle UTF-8 input in non-UTF-8 locale.\n- kernel/smp: make csdlock timeout depend on boot parameter (bsc#1180846). \n- kvm: svm: Update svm_xsaves_supported (jsc#SLE-13573).\n- kvm: x86: Enumerate support for CLZERO instruction (jsc#SLE-13573).\n- leds: lp5523: check return value of lp5xx_read and jump to cleanup code (git-fixes).\n- lib/syscall: fix syscall registers retrieval on 32-bit platforms (git-fixes).\n- libbpf: Add explicit padding to bpf_xdp_set_link_opts (bsc#1177028).\n- libbpf: Add explicit padding to btf_dump_emit_type_decl_opts (bsc#1177028).\n- libbpf: Clear map_info before each bpf_obj_get_info_by_fd (bsc#1155518).\n- libbpf: Fix BTF dump of pointer-to-array-of-struct (bsc#1155518).\n- libbpf: Fix INSTALL flag order (bsc#1155518).\n- libbpf: Fix bail out from \u0027ringbuf_process_ring()\u0027 on error (bsc#1177028).\n- libbpf: Fix error path in bpf_object__elf_init() (bsc#1177028).\n- libbpf: Fix signed overflow in ringbuf_process_ring (bsc#1177028).\n- libbpf: Initialize the bpf_seq_printf parameters array field by field (bsc#1177028).\n- libbpf: Only create rx and tx XDP rings when necessary (bsc#1155518).\n- libbpf: Use SOCK_CLOEXEC when opening the netlink socket (bsc#1155518).\n- libnvdimm/label: Return -ENXIO for no slot in __blk_label_update (bsc#1185269).\n- libnvdimm/namespace: Fix reaping of invalidated block-window-namespace labels (bsc#1185269).\n- libnvdimm/region: Fix nvdimm_has_flush() to handle ND_REGION_ASYNC (bsc#1184969 git-fixes).\n- libnvdimm/security: ensure sysfs poll thread woke up and fetch updated attr (git-fixes).\n- liquidio: Fix unintented sign extension of a left shift of a u16 (git-fixes).\n- locking/mutex: Fix non debug version of mutex_lock_io_nested() (git-fixes).\n- locking/qrwlock: Fix ordering in queued_write_lock_slowpath() (bsc#1185041).\n- lpfc: Decouple port_template and vport_template (bsc#185032).\n- mISDN: fix crash in fritzpci (git-fixes).\n- mac80211: Allow HE operation to be longer than expected (git-fixes).\n- mac80211: bail out if cipher schemes are invalid (git-fixes).\n- mac80211: choose first enabled channel for monitor (git-fixes).\n- mac80211: clear sta-\u003efast_rx when STA removed from 4-addr VLAN (git-fixes).\n- mac80211: clear the beacon\u0027s CRC after channel switch (git-fixes).\n- mac80211: fix TXQ AC confusion (git-fixes).\n- mac80211: fix double free in ibss_leave (git-fixes).\n- mac80211: fix rate mask reset (git-fixes).\n- macvlan: macvlan_count_rx() needs to be aware of preemption (git-fixes).\n- md-cluster: fix use-after-free issue when removing rdev (bsc#1184082).\n- md/raid1: properly indicate failure when ending a failed write request (bsc#1185680).\n- md: do not flush workqueue unconditionally in md_open (bsc#1184081).\n- md: factor out a mddev_find_locked helper from mddev_find (bsc#1184081).\n- md: md_open returns -EBUSY when entering racing area (bsc#1184081).\n- md: split mddev_find (bsc#1184081).\n- mdio: fix mdio-thunder.c dependency \u0026 build error (git-fixes).\n- media: adv7604: fix possible use-after-free in adv76xx_remove() (git-fixes).\n- media: cros-ec-cec: do not bail on device_init_wakeup failure (git-fixes).\n- media: cx23885: add more quirks for reset DMA on some AMD IOMMU (git-fixes).\n- media: drivers: media: pci: sta2x11: fix Kconfig dependency on GPIOLIB (git-fixes).\n- media: dvb-usb: fix memory leak in dvb_usb_adapter_init (git-fixes).\n- media: dvbdev: Fix memory leak in dvb_media_device_free() (git-fixes).\n- media: em28xx: fix memory leak (git-fixes).\n- media: gspca/sq905.c: fix uninitialized variable (git-fixes).\n- media: i2c: adv7511-v4l2: fix possible use-after-free in adv7511_remove() (git-fixes).\n- media: i2c: adv7842: fix possible use-after-free in adv7842_remove() (git-fixes).\n- media: i2c: tda1997: Fix possible use-after-free in tda1997x_remove() (git-fixes).\n- media: imx: capture: Return -EPIPE from __capture_legacy_try_fmt() (git-fixes).\n- media: ite-cir: check for receive overflow (git-fixes).\n- media: m88rs6000t: avoid potential out-of-bounds reads on arrays (git-fixes).\n- media: mantis: remove orphan mantis_core.c (git-fixes).\n- media: mceusb: sanity check for prescaler value (git-fixes).\n- media: media/saa7164: fix saa7164_encoder_register() memory leak bugs (git-fixes).\n- media: omap4iss: return error code when omap4iss_get() failed (git-fixes).\n- media: platform: sti: Fix runtime PM imbalance in regs_show (git-fixes).\n- media: platform: sunxi: sun6i-csi: fix error return code of sun6i_video_start_streaming() (git-fixes).\n- media: rc: compile rc-cec.c into rc-core (git-fixes).\n- media: saa7134: use sg_dma_len when building pgtable (git-fixes).\n- media: saa7146: use sg_dma_len when building pgtable (git-fixes).\n- media: staging/intel-ipu3: Fix memory leak in imu_fmt (git-fixes).\n- media: staging/intel-ipu3: Fix race condition during set_fmt (git-fixes).\n- media: staging/intel-ipu3: Fix set_fmt error handling (git-fixes).\n- media: tc358743: fix possible use-after-free in tc358743_remove() (git-fixes).\n- media: usbtv: Fix deadlock on suspend (git-fixes).\n- media: uvcvideo: Allow entities with no pads (git-fixes).\n- media: v4l2-ctrls.c: fix race condition in hdl-\u003erequests list (git-fixes).\n- media: v4l2-ctrls.c: fix shift-out-of-bounds in std_validate (git-fixes).\n- media: v4l: vsp1: Fix bru null pointer access (git-fixes).\n- media: v4l: vsp1: Fix uif null pointer access (git-fixes).\n- media: vicodec: add missing v4l2_ctrl_request_hdl_put() (git-fixes).\n- memory: gpmc: fix out of bounds read and dereference on gpmc_cs[] (git-fixes).\n- memory: mtk-smi: Fix PM usage counter unbalance in mtk_smi ops (bsc#1183325).\n- memory: pl353: fix mask of ECC page_size config register (git-fixes).\n- mfd: arizona: Fix rumtime PM imbalance on error (git-fixes).\n- mfd: intel_pmt: Fix nuisance messages and handling of disabled capabilities (git-fixes).\n- mfd: lpc_sch: Partially revert \u0027Add support for Intel Quark X1000\u0027 (git-fixes).\n- mfd: stm32-timers: Avoid clearing auto reload register (git-fixes).\n- misc/pvpanic: Export module FDT device table (git-fixes).\n- misc/uss720: fix memory leak in uss720_probe (git-fixes).\n- misc: eeprom_93xx46: Add quirk to support Microchip 93LC46B eeprom (git-fixes).\n- misc: fastrpc: restrict user apps from sending kernel RPC messages (git-fixes).\n- misc: lis3lv02d: Fix false-positive WARN on various HP models (git-fixes).\n- misc: vmw_vmci: explicitly initialize vmci_datagram payload (git-fixes).\n- misc: vmw_vmci: explicitly initialize vmci_notify_bm_set_msg struct (git-fixes).\n- mlxsw: spectrum_mr: Update egress RIF list before route\u0027s action (git-fixes).\n- mm, numa: fix bad pmd by atomically check for pmd_trans_huge when marking page tables prot_numa (bsc#1168777).\n- mm/rmap: fix potential pte_unmap on an not mapped pte (git-fixes).\n- mm: hugetlbfs: fix cannot migrate the fallocated HugeTLB page (git-fixes).\n- mm: memcontrol: fix cpuhotplug statistics flushing (bsc#1185606).\n- mmc: block: Update ext_csd.cache_ctrl if it was written (git-fixes).\n- mmc: core: Correct descriptions in mmc_of_parse() (git-fixes).\n- mmc: core: Do a power cycle when the CMD11 fails (git-fixes).\n- mmc: core: Fix partition switch time for eMMC (git-fixes).\n- mmc: core: Set read only for SD cards with permanent write protect bit (git-fixes).\n- mmc: cqhci: Add cqhci_deactivate() (git-fixes).\n- mmc: cqhci: Fix random crash when remove mmc module/card (git-fixes).\n- mmc: mmc_spi: Drop unused NO_IRQ definition (git-fixes).\n- mmc: mxs-mmc: Fix a resource leak in an error handling path in \u0027mxs_mmc_probe()\u0027 (git-fixes).\n- mmc: sdhci-iproc: Cap min clock frequency on BCM2711 (bsc#1186009)\n- mmc: sdhci-iproc: Set SDHCI_QUIRK_CAP_CLOCK_BASE_BROKEN on BCM2711 (bsc#1186009)\n- mmc: sdhci-of-arasan: Add missed checks for devm_clk_register() (git-fixes).\n- mmc: sdhci-of-dwcmshc: fix rpmb access (git-fixes).\n- mmc: sdhci-of-dwcmshc: implement specific set_uhs_signaling (git-fixes).\n- mmc: sdhci-of-dwcmshc: set SDHCI_QUIRK2_PRESET_VALUE_BROKEN (git-fixes).\n- mmc: sdhci-of-esdhc: make sure delay chain locked for HS400 (git-fixes).\n- mmc: sdhci-of-esdhc: set timeout to max before tuning (git-fixes).\n- mmc: sdhci-pci-gli: increase 1.8V regulator wait (git-fixes).\n- mmc: sdhci-pci: Add PCI IDs for Intel LKF (git-fixes).\n- mmc: sdhci-pci: Fix SDHCI_RESET_ALL for CQHCI for Intel GLK-based controllers (git-fixes).\n- mmc: sdhci-pci: Fix initialization of some SD cards for Intel BYT-based controllers (git-fixes).\n- mmc: sdhci: Check for reset prior to DMA address unmap (git-fixes).\n- mmc: sdhci: Use Auto CMD Auto Select only when v4_mode is true (git-fixes).\n- mmc: uniphier-sd: Fix a resource leak in the remove function (git-fixes).\n- mmc: uniphier-sd: Fix an error handling path in uniphier_sd_probe() (git-fixes).\n- mount: fix mounting of detached mounts onto targets that reside on shared mounts (git-fixes).\n- mt7601u: fix always true expression (git-fixes).\n- mt76: dma: do not report truncated frames to mac80211 (git-fixes).\n- mt76: mt7615: fix entering driver-own state on mt7663 (git-fixes).\n- mt76: mt7615: support loading EEPROM for MT7613BE (git-fixes).\n- mt76: mt76x0: disable GTK offloading (git-fixes).\n- mt76: mt7915: fix aggr len debugfs node (git-fixes).\n- mt76: mt7915: fix txpower init for TSSI off chips (git-fixes).\n- mtd: Handle possible -EPROBE_DEFER from parse_mtd_partitions() (git-fixes).\n- mtd: rawnand: atmel: Update ecc_stats.corrected counter (git-fixes).\n- mtd: rawnand: brcmnand: fix OOB R/W with Hamming ECC (git-fixes).\n- mtd: rawnand: fsmc: Fix error code in fsmc_nand_probe() (git-fixes).\n- mtd: rawnand: gpmi: Fix a double free in gpmi_nand_init (git-fixes).\n- mtd: rawnand: qcom: Return actual error code instead of -ENODEV (git-fixes).\n- mtd: require write permissions for locking and badblock ioctls (git-fixes).\n- mtd: spi-nor: Rename \u0027n25q512a\u0027 to \u0027mt25qu512a (n25q512a)\u0027 (bsc#1167260).\n- mtd: spi-nor: Split mt25qu512a (n25q512a) entry into two (bsc#1167260).\n- mtd: spinand: core: add missing MODULE_DEVICE_TABLE() (git-fixes).\n- mwifiex: pcie: skip cancel_work_sync() on reset failure path (git-fixes).\n- nbd: fix a block_device refcount leak in nbd_release (git-fixes).\n- net, xdp: Update pkt_type if generic XDP changes unicast MAC (git-fixes).\n- net/mlx4_core: Add missed mlx4_free_cmd_mailbox() (git-fixes).\n- net/mlx4_en: update moderation when config reset (git-fixes).\n- net/mlx5: Add back multicast stats for uplink representor (jsc#SLE-15172).\n- net/mlx5: Delete extra dump stack that gives nothing (git-fixes).\n- net/mlx5: Do not request more than supported EQs (git-fixes).\n- net/mlx5: Fix PPLM register mapping (jsc#SLE-8464).\n- net/mlx5: Fix bit-wise and with zero (jsc#SLE-15172).\n- net/mlx5: Fix health error state handling (bsc#1186467).\n- net/mlx5e: Allow to match on MPLS parameters only for MPLS over UDP (jsc#SLE-15172).\n- net/mlx5e: Do not match on Geneve options in case option masks are all zero (git-fixes).\n- net/mlx5e: E-switch, Fix rate calculation division (jsc#SLE-8464).\n- net/mlx5e: Fix error path for ethtool set-priv-flag (git-fixes).\n- net/mlx5e: Fix ethtool indication of connector type (git-fixes).\n- net/mlx5e: Fix setting of RS FEC mode (jsc#SLE-15172).\n- net/mlx5e: Offload tuple rewrite for non-CT flows (jsc#SLE-15172).\n- net/mlx5e: RX, Mind the MPWQE gaps when calculating offsets (jsc#SLE-15172).\n- net/mlx5e: fix ingress_ifindex check in mlx5e_flower_parse_meta (jsc#SLE-8464).\n- net/qlcnic: Fix a use after free in qlcnic_83xx_get_minidump_template (git-fixes).\n- net/sched: act_ct: fix wild memory access when clearing fragments (bsc#1176447).\n- net: arc_emac: Fix memleak in arc_mdio_probe (git-fixes).\n- net: atheros: switch from \u0027pci_\u0027 to \u0027dma_\u0027 API (git-fixes).\n- net: atlantic: fix out of range usage of active_vlans array (git-fixes).\n- net: atlantic: fix potential error handling (git-fixes).\n- net: atlantic: fix use after free kasan warn (git-fixes).\n- net: b44: fix error return code in b44_init_one() (git-fixes).\n- net: bonding: fix error return code of bond_neigh_init() (bsc#1154353).\n- net: cdc-phonet: fix data-interface release on probe failure (git-fixes).\n- net: cls_api: Fix uninitialised struct field bo-\u003eunlocked_driver_cb (bsc#1176447).\n- net: dsa: felix: implement port flushing on .phylink_mac_link_down (git-fixes).\n- net: dsa: rtl8366: Fix VLAN semantics (git-fixes).\n- net: dsa: rtl8366: Fix VLAN set-up (git-fixes).\n- net: dsa: rtl8366rb: Support all 4096 VLANs (git-fixes).\n- net: enetc: allow hardware timestamping on TX queues with tc-etf enabled (git-fixes).\n- net: enetc: do not disable VLAN filtering in IFF_PROMISC mode (git-fixes).\n- net: enetc: fix link error again (git-fixes).\n- net: enetc: remove bogus write to SIRXIDR from enetc_setup_rxbdr (git-fixes).\n- net: enetc: take the MDIO lock only once per NAPI poll cycle (git-fixes).\n- net: enic: Cure the enic api locking trainwreck (git-fixes).\n- net: ethernet: aquantia: Fix wrong return value (git-fixes).\n- net: ethernet: cavium: octeon_mgmt: use phy_start and phy_stop (git-fixes).\n- net: ethernet: ibm: ibmvnic: Fix some kernel-doc misdemeanours (bsc#1183871 ltc#192139).\n- net: ethernet: ti: cpsw: fix clean up of vlan mc entries for host port (git-fixes).\n- net: ethernet: ti: cpsw: fix error return code in cpsw_probe() (git-fixes).\n- net: fec: Fix PHY init after phy_reset_after_clk_enable() (git-fixes).\n- net: fec: Fix phy_device lookup for phy_reset_after_clk_enable() (git-fixes).\n- net: fec: Fix reference count leak in fec series ops (git-fixes).\n- net: gemini: Fix another missing clk_disable_unprepare() in probe (git-fixes).\n- net: gemini: Fix missing free_netdev() in error path of gemini_ethernet_port_probe() (git-fixes).\n- net: geneve: check skb is large enough for IPv4/IPv6 header (git-fixes).\n- net: geneve: modify IP header check in geneve6_xmit_skb and geneve_xmit_skb (git-fixes).\n- net: gianfar: Add of_node_put() before goto statement (git-fixes).\n- net: hdlc: In hdlc_rcv, check to make sure dev is an HDLC device (git-fixes).\n- net: hdlc_raw_eth: Clear the IFF_TX_SKB_SHARING flag after calling ether_setup (git-fixes).\n- net: hns3: Fix for geneve tx checksum bug (git-fixes).\n- net: hns3: Remove the left over redundant check \u0026 assignment (bsc#1154353).\n- net: hns3: Remove un-necessary \u0027else-if\u0027 in the hclge_reset_event() (git-fixes).\n- net: hns3: add check for HNS3_NIC_STATE_INITED in hns3_reset_notify_up_enet() (git-fixes).\n- net: hns3: clear VF down state bit before request link status (git-fixes).\n- net: hns3: clear unnecessary reset request in hclge_reset_rebuild (git-fixes).\n- net: hns3: disable phy loopback setting in hclge_mac_start_phy (git-fixes).\n- net: hns3: fix bug when calculating the TCAM table info (git-fixes).\n- net: hns3: fix for vxlan gpe tx checksum bug (git-fixes).\n- net: hns3: fix incorrect configuration for igu_egu_hw_err (git-fixes).\n- net: hns3: fix query vlan mask value error for flow director (git-fixes).\n- net: hns3: initialize the message content in hclge_get_link_mode() (git-fixes).\n- net: hns3: use netif_tx_disable to stop the transmit queue (git-fixes).\n- net: korina: cast KSEG0 address to pointer in kfree (git-fixes).\n- net: korina: fix kfree of rx/tx descriptor array (git-fixes).\n- net: lantiq: Wait for the GPHY firmware to be ready (git-fixes).\n- net: ll_temac: Add more error handling of dma_map_single() calls (git-fixes).\n- net: ll_temac: Fix RX buffer descriptor handling on GFP_ATOMIC pressure (git-fixes).\n- net: ll_temac: Fix race condition causing TX hang (git-fixes).\n- net: ll_temac: Handle DMA halt condition caused by buffer underrun (git-fixes).\n- net: mvneta: fix double free of txq-\u003ebuf (git-fixes).\n- net: mvneta: make tx buffer array agnostic (git-fixes).\n- net: pasemi: fix error return code in pasemi_mac_open() (git-fixes).\n- net: phy: broadcom: Only advertise EEE for supported modes (git-fixes).\n- net: phy: intel-xway: enable integrated led functions (git-fixes).\n- net: phy: marvell: fix m88e1011_set_downshift (git-fixes).\n- net: phy: marvell: fix m88e1111_set_downshift (git-fixes).\n- net: qcom/emac: add missed clk_disable_unprepare in error path of emac_clks_phase1_init (git-fixes).\n- net: qualcomm: rmnet: Fix incorrect receive packet handling during cleanup (git-fixes).\n- net: sched: disable TCQ_F_NOLOCK for pfifo_fast (bsc#1183405)\n- net: smc911x: Adjust indentation in smc911x_phy_configure (git-fixes).\n- net: spider_net: Fix the size used in a \u0027dma_free_coherent()\u0027 call (git-fixes).\n- net: stmmac: Fix incorrect location to set real_num_rx|tx_queues (git-fixes).\n- net: stmmac: Use rtnl_lock/unlock on netif_set_real_num_rx_queues() call (git-fixes).\n- net: stmmac: fix missing IFF_MULTICAST check in dwmac4_set_filter (git-fixes).\n- net: stmmac: removed enabling eee in EEE set callback (git-fixes).\n- net: stmmac: use netif_tx_start|stop_all_queues() function (git-fixes).\n- net: stmmac: xgmac: fix missing IFF_MULTICAST checki in dwxgmac2_set_filter (git-fixes).\n- net: thunderx: Fix unintentional sign extension issue (git-fixes).\n- net: tulip: Adjust indentation in {dmfe, uli526x}_init_module (git-fixes).\n- net: usb: ax88179_178a: fix missing stop entry in driver_info (git-fixes).\n- net: usb: fix memory leak in smsc75xx_bind (git-fixes).\n- net: usb: qmi_wwan: allow qmimux add/del with master up (git-fixes).\n- net: usb: qmi_wwan: support ZTE P685M modem (git-fixes).\n- net: wan/lmc: unregister device when no matching device is found (git-fixes).\n- net:nfc:digital: Fix a double free in digital_tg_recv_dep_req (git-fixes).\n- netdevice: Add missing IFF_PHONY_HEADROOM self-definition (git-fixes).\n- netdevsim: init u64 stats for 32bit hardware (git-fixes).\n- netfilter: conntrack: Make global sysctls readonly in non-init netns (bsc#1176447).\n- netfilter: conntrack: add new sysctl to disable RST check (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: avoid misleading \u0027invalid\u0027 in log message (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: improve RST handling when tuple is re-used (bsc#1183947 bsc#1185950).\n- netfilter: flowtable: Make sure GC works periodically in idle system (bsc#1176447).\n- netfilter: flowtable: fix NAT IPv6 offload mangling (bsc#1176447).\n- netfilter: nftables: allow to update flowtable flags (bsc#1176447).\n- netfilter: nftables: report EOPNOTSUPP on unsupported flowtable flags (bsc#1176447).\n- netsec: restore phy power state after controller reset (bsc#1183757).\n- nfc: pn533: prevent potential memory corruption (git-fixes).\n- nfp: devlink: initialize the devlink port attribute \u0027lanes\u0027 (bsc#1176447).\n- nfp: flower: add ipv6 bit to pre_tunnel control message (bsc#1176447).\n- nfp: flower: fix pre_tun mask id allocation (bsc#1154353).\n- nfp: flower: ignore duplicate merge hints from FW (git-fixes).\n- node: fix device cleanups in error handling code (git-fixes).\n- null_blk: fix passing of REQ_FUA flag in null_handle_rq (git-fixes).\n- nvme-core: add cancel tagset helpers (bsc#1183976).\n- nvme-fabrics: decode host pathing error for connect (bsc#1179827).\n- nvme-fabrics: fix kato initialization (bsc#1182591).\n- nvme-fabrics: only reserve a single tag (bsc#1182077).\n- nvme-fabrics: reject I/O to offline device (bsc#1181161).\n- nvme-fc: check sgl supported by target (bsc#1179827).\n- nvme-fc: clear q_live at beginning of association teardown (bsc#1186479).\n- nvme-fc: fix racing controller reset and create association (bsc#1183048).\n- nvme-fc: return NVME_SC_HOST_ABORTED_CMD when a command has been aborted (bsc#1180197).\n- nvme-fc: return NVME_SC_HOST_ABORTED_CMD when a command has been aborted (bsc#1184259).\n- nvme-fc: set NVME_REQ_CANCELLED in nvme_fc_terminate_exchange() (bsc#1180197).\n- nvme-fc: set NVME_REQ_CANCELLED in nvme_fc_terminate_exchange() (bsc#1184259).\n- nvme-fc: short-circuit reconnect retries (bsc#1179827).\n- nvme-hwmon: Return error code when registration fails (bsc#1177326).\n- nvme-hwmon: Return error code when registration fails (bsc#1177326).\n- nvme-multipath: fix double initialization of ANA state (bsc#1178612, bsc#1184259).\n- nvme-multipath: reset bdev to ns head when failover (bsc#178378 bsc#1182999).\n- nvme-pci: Remove tag from process cq (git-fixes).\n- nvme-pci: Remove two-pass completions (git-fixes).\n- nvme-pci: Simplify nvme_poll_irqdisable (git-fixes).\n- nvme-pci: align io queue count with allocted nvme_queue in (git-fixes).\n- nvme-pci: avoid race between nvme_reap_pending_cqes() and nvme_poll() (git-fixes).\n- nvme-pci: dma read memory barrier for completions (git-fixes).\n- nvme-pci: fix \u0027slimmer CQ head update\u0027 (git-fixes).\n- nvme-pci: make sure write/poll_queues less or equal then cpu (git-fixes).\n- nvme-pci: remove last_sq_tail (git-fixes).\n- nvme-pci: remove volatile cqes (git-fixes).\n- nvme-pci: slimmer CQ head update (git-fixes).\n- nvme-pci: use simple suspend when a HMB is enabled (git-fixes).\n- nvme-tcp: Fix possible race of io_work and direct send (git-fixes).\n- nvme-tcp: Fix warning with CONFIG_DEBUG_PREEMPT (git-fixes).\n- nvme-tcp: add clean action for failed reconnection (bsc#1183976).\n- nvme-tcp: fix kconfig dependency warning when !CRYPTO (git-fixes).\n- nvme-tcp: fix misuse of __smp_processor_id with preemption (git-fixes).\n- nvme-tcp: fix possible hang waiting for icresp response (bsc#1179519).\n- nvme-tcp: fix possible hang when failing to set io queues (bsc#1181161).\n- nvme-tcp: use cancel tagset helper for tear down (bsc#1183976).\n- nvme: Fix NULL dereference for pci nvme controllers (bsc#1182378).\n- nvme: add \u0027kato\u0027 sysfs attribute (bsc#1179825).\n- nvme: add NVME_REQ_CANCELLED flag in nvme_cancel_request() (bsc#1180197).\n- nvme: add NVME_REQ_CANCELLED flag in nvme_cancel_request() (bsc#1184259).\n- nvme: allocate the keep alive request using BLK_MQ_REQ_NOWAIT (bsc#1182077).\n- nvme: call nvme_identify_ns as the first thing in nvme_alloc_ns_block (bsc#1180197).\n- nvme: clean up the check for too large logic block sizes (bsc#1180197).\n- nvme: define constants for identification values (git-fixes).\n- nvme: do not intialize hwmon for discovery controllers (bsc#1184259).\n- nvme: do not intialize hwmon for discovery controllers (git-fixes).\n- nvme: document nvme controller states (git-fixes).\n- nvme: explicitly update mpath disk capacity on revalidation (git-fixes).\n- nvme: expose reconnect_delay and ctrl_loss_tmo via sysfs (bsc#1182378).\n- nvme: factor out a nvme_configure_metadata helper (bsc#1180197).\n- nvme: fix controller instance leak (git-fixes).\n- nvme: fix deadlock in disconnect during scan_work and/or ana_work (git-fixes).\n- nvme: fix initialization of the zone bitmaps (bsc#1180197).\n- nvme: fix possible deadlock when I/O is blocked (git-fixes).\n- nvme: freeze the queue over -\u003elba_shift updates (bsc#1180197).\n- nvme: lift the check for an unallocated namespace into nvme_identify_ns (bsc#1180197).\n- nvme: merge nvme_keep_alive into nvme_keep_alive_work (bsc#1182077).\n- nvme: move nvme_validate_ns (bsc#1180197).\n- nvme: opencode revalidate_disk in nvme_validate_ns (bsc#1180197).\n- nvme: query namespace identifiers before adding the namespace (bsc#1180197).\n- nvme: refactor nvme_validate_ns (bsc#1180197).\n- nvme: remove nvme_identify_ns_list (bsc#1180197).\n- nvme: remove nvme_update_formats (bsc#1180197).\n- nvme: remove superfluous else in nvme_ctrl_loss_tmo_store (bsc#1182378).\n- nvme: remove the 0 lba_shift check in nvme_update_ns_info (bsc#1180197).\n- nvme: remove the disk argument to nvme_update_zone_info (bsc#1180197).\n- nvme: rename __nvme_revalidate_disk (bsc#1180197).\n- nvme: rename _nvme_revalidate_disk (bsc#1180197).\n- nvme: rename nvme_validate_ns to nvme_validate_or_alloc_ns (bsc#1180197).\n- nvme: retrigger ANA log update if group descriptor isn\u0027t found (git-fixes)\n- nvme: return an error if nvme_set_queue_count() fails (bsc#1180197).\n- nvme: revalidate zone bitmaps in nvme_update_ns_info (bsc#1180197).\n- nvme: sanitize KATO setting (bsc#1179825).\n- nvme: set the queue limits in nvme_update_ns_info (bsc#1180197).\n- nvme: simplify error logic in nvme_validate_ns() (bsc#1180197).\n- nvme: simplify error logic in nvme_validate_ns() (bsc#1184259).\n- nvme: update the known admin effects (bsc#1180197).\n- nvmet-rdma: Fix list_del corruption on queue establishment failure (bsc#1183501).\n- nvmet: fix a memory leak (git-fixes).\n- nvmet: seset ns-\u003efile when open fails (bsc#1183873).\n- nvmet: use new ana_log_size instead the old one (bsc#1184259).\n- nxp-i2c: restore includes for kABI (bsc#1185589).\n- nxp-nci: add NXP1002 id (bsc#1185589).\n- ocfs2: fix a use after free on error (bsc#1184738).\n- ovl: fix dentry leak in ovl_get_redirect (bsc#1184176).\n- ovl: fix out of date comment and unreachable code (bsc#1184176).\n- ovl: fix regression with re-formatted lower squashfs (bsc#1184176).\n- ovl: fix unneeded call to ovl_change_flags() (bsc#1184176).\n- ovl: fix value of i_ino for lower hardlink corner case (bsc#1184176).\n- ovl: initialize error in ovl_copy_xattr (bsc#1184176).\n- ovl: relax WARN_ON() when decoding lower directory file handle (bsc#1184176).\n- partitions/ibm: fix non-DASD devices (bsc#1185857 LTC#192526).\n- pata_arasan_cf: fix IRQ check (git-fixes).\n- pata_ipx4xx_cf: fix IRQ check (git-fixes).\n- perf/amd/uncore: Fix sysfs type mismatch (bsc#1178134).\n- phy: marvell: ARMADA375_USBCLUSTER_PHY should not default to y, unconditionally (git-fixes).\n- phy: phy-twl4030-usb: Fix possible use-after-free in twl4030_usb_remove() (git-fixes).\n- pinctrl: Ingenic: Add missing pins to the JZ4770 MAC MII group (git-fixes).\n- pinctrl: core: Fix kernel doc string for pin_get_name() (git-fixes).\n- pinctrl: ingenic: Improve unreachable code generation (git-fixes).\n- pinctrl: lewisburg: Update number of pins in community (git-fixes).\n- pinctrl: qcom: spmi-gpio: fix warning about irq chip reusage (git-fixes).\n- pinctrl: rockchip: fix restore error in resume (git-fixes).\n- pinctrl: samsung: use \u0027int\u0027 for register masks in Exynos (git-fixes).\n- platform/mellanox: mlxbf-tmfifo: Fix a memory barrier issue (git-fixes).\n- platform/x86: acer-wmi: Add ACER_CAP_KBD_DOCK quirk for the Aspire Switch 10E SW3-016 (git-fixes).\n- platform/x86: acer-wmi: Add ACER_CAP_SET_FUNCTION_MODE capability flag (git-fixes).\n- platform/x86: acer-wmi: Add new force_caps module parameter (git-fixes).\n- platform/x86: acer-wmi: Add support for SW_TABLET_MODE on Switch devices (git-fixes).\n- platform/x86: acer-wmi: Cleanup ACER_CAP_FOO defines (git-fixes).\n- platform/x86: acer-wmi: Cleanup accelerometer device handling (git-fixes).\n- platform/x86: intel-hid: Support Lenovo ThinkPad X1 Tablet Gen 2 (git-fixes).\n- platform/x86: intel-vbtn: Stop reporting SW_DOCK events (git-fixes).\n- platform/x86: intel_int0002_vgpio: Only call enable_irq_wake() when using s2idle (git-fixes).\n- platform/x86: intel_pmc_core: Do not use global pmcdev in quirks (git-fixes).\n- platform/x86: intel_pmt_crashlog: Fix incorrect macros (git-fixes).\n- platform/x86: pmc_atom: Match all Beckhoff Automation baytrail boards with critclk_systems DMI table (git-fixes).\n- platform/x86: thinkpad_acpi: Allow the FnLock LED to change state (git-fixes).\n- platform/x86: thinkpad_acpi: Correct thermal sensor allocation (git-fixes).\n- posix-timers: Preserve return value in clock_adjtime32() (git-fixes)\n- post.sh: Return an error when module update fails (bsc#1047233 bsc#1184388).\n- power: supply: Use IRQF_ONESHOT (git-fixes).\n- power: supply: generic-adc-battery: fix possible use-after-free in gab_remove() (git-fixes).\n- power: supply: s3c_adc_battery: fix possible use-after-free in s3c_adc_bat_remove() (git-fixes).\n- powerepc/book3s64/hash: Align start/end address correctly with bolt mapping (bsc#1184957).\n- powerpc/64s/exception: Clean up a missed SRR specifier (jsc#SLE-9246 git-fixes).\n- powerpc/64s: Fix crashes when toggling entry flush barrier (bsc#1177666 git-fixes).\n- powerpc/64s: Fix crashes when toggling stf barrier (bsc#1087082 git-fixes).\n- powerpc/64s: Fix instruction encoding for lis in ppc_function_entry() (bsc#1065729).\n- powerpc/64s: Fix pte update for kernel memory on radix (bsc#1055117 git-fixes).\n- powerpc/asm-offsets: GPR14 is not needed either (bsc#1065729).\n- powerpc/book3s64/radix: Remove WARN_ON in destroy_context() (bsc#1183692 ltc#191963).\n- powerpc/eeh: Fix EEH handling for hugepages in ioremap space (bsc#1156395).\n- powerpc/fadump: Mark fadump_calculate_reserve_size as __init (bsc#1065729).\n- powerpc/kexec_file: Use current CPU info while setting up FDT (bsc#1184615 ltc#189835).\n- powerpc/kuap: Restore AMR after replaying soft interrupts (bsc#1156395).\n- powerpc/mm: Add cond_resched() while removing hpte mappings (bsc#1183289 ltc#191637).\n- powerpc/papr_scm: Fix build error due to wrong printf specifier (bsc#1184969).\n- powerpc/papr_scm: Implement support for H_SCM_FLUSH hcall (bsc#1184969).\n- powerpc/perf: Fix PMU constraint check for EBB events (bsc#1065729).\n- powerpc/perf: Fix sampled instruction type for larx/stcx (jsc#SLE-13513).\n- powerpc/perf: Fix the threshold event selection for memory events in power10 (jsc#SLE-13513).\n- powerpc/pmem: Include pmem prototypes (bsc#1113295 git-fixes).\n- powerpc/prom: Mark identical_pvr_fixup as __init (bsc#1065729).\n- powerpc/pseries/mobility: handle premature return from H_JOIN (bsc#1181674 ltc#189159 git-fixes bsc#1183662 ltc#191922).\n- powerpc/pseries/mobility: use struct for shared state (bsc#1181674 ltc#189159 git-fixes bsc#1183662 ltc#191922).\n- powerpc/pseries/ras: Remove unused variable \u0027status\u0027 (bsc#1065729).\n- powerpc/pseries: Add shutdown() to vio_driver and vio_bus (bsc#1184209 ltc#190917).\n- powerpc/pseries: Do not trace hcall tracing wrapper (bsc#1185110 ltc#192091).\n- powerpc/pseries: Fix hcall tracing recursion in pv queued spinlocks (bsc#1185110 ltc#192091).\n- powerpc/pseries: use notrace hcall variant for H_CEDE idle (bsc#1185110 ltc#192091).\n- powerpc/pseries: warn if recursing into the hcall tracing code (bsc#1185110 ltc#192091).\n- powerpc/smp: Reintroduce cpu_core_mask (jsc#SLE-13615 bsc#1180100 ltc#190257 git-fixes).\n- powerpc/sstep: Check instruction validity against ISA version before emulation (bsc#1156395).\n- powerpc/sstep: Check instruction validity against ISA version before emulation (bsc#1156395).\n- powerpc/sstep: Fix darn emulation (bsc#1156395).\n- powerpc/sstep: Fix incorrect return from analyze_instr() (bsc#1156395).\n- powerpc/sstep: Fix load-store and update emulation (bsc#1156395).\n- powerpc/time: Enable sched clock for irqtime (bsc#1156395).\n- powerpc/uaccess: Avoid might_fault() when user access is enabled (bsc#1156395).\n- powerpc/uaccess: Perform barrier_nospec() in KUAP allowance helpers (bsc#1156395).\n- powerpc/uaccess: Simplify unsafe_put_user() implementation (bsc#1156395).\n- powerpc/xive: Drop check on irq_data in xive_core_debug_show() (bsc#1177437 ltc#188522 jsc#SLE-13294 git-fixes).\n- powerpc/xmon: Fix build failure for 8xx (jsc#SLE-12936 git-fixes).\n- powerpc: Fix inverted SET_FULL_REGS bitop (jsc#SLE-9246 git-fixes).\n- powerpc: Fix missing declaration ofable_kernel_vsx() (git-fixes).\n- proc: fix lookup in /proc/net subdirectories after setns(2) (git-fixes).\n- qlcnic: fix error return code in qlcnic_83xx_restart_hw() (git-fixes).\n- qtnfmac: Fix possible buffer overflow in qtnf_event_handle_external_auth (git-fixes).\n- qxl: Fix uninitialised struct field head.surface_id (git-fixes).\n- r8169: do not advertise pause in jumbo mode (git-fixes).\n- r8169: fix DMA being used after buffer free if WoL is enabled (git-fixes).\n- r8169: tweak max read request size for newer chips also in jumbo mtu mode (git-fixes).\n- regmap: set debugfs_name to NULL after it is freed (git-fixes).\n- regulator: Avoid a double \u0027of_node_get\u0027 in \u0027regulator_of_get_init_node()\u0027 (git-fixes).\n- regulator: bd9571mwv: Fix AVS and DVFS voltage range (git-fixes).\n- reintroduce cqhci_suspend for kABI (git-fixes).\n- reiserfs: update reiserfs_xattrs_initialized() condition (bsc#1184737).\n- rsi: Fix TX EAPOL packet handling against iwlwifi AP (git-fixes).\n- rsi: Move card interrupt handling to RX thread (git-fixes).\n- rsi: Use resume_noirq for SDIO (git-fixes).\n- rsxx: remove extraneous \u0027const\u0027 qualifier (git-fixes).\n- rtc: ds1307: Fix wday settings for rx8130 (git-fixes).\n- rtc: fsl-ftm-alarm: add MODULE_TABLE() (bsc#1185454).\n- rtc: fsl-ftm-alarm: avoid struct rtc_time conversions (bsc#1185454).\n- rtc: fsl-ftm-alarm: enable acpi support (bsc#1185454).\n- rtc: fsl-ftm-alarm: fix freeze(s2idle) failed to wake (bsc#1185454).\n- rtc: fsl-ftm-alarm: report alarm to core (bsc#1185454).\n- rtc: fsl-ftm-alarm: switch to ktime_get_real_seconds (bsc#1185454).\n- rtc: fsl-ftm-alarm: switch to rtc_time64_to_tm/rtc_tm_to_time64 (bsc#1185454).\n- rtc: fsl-ftm-alarm: update acpi device id (bsc#1185454).\n- rtc: pcf2127: add alarm support (bsc#1185233).\n- rtc: pcf2127: add pca2129 device id (bsc#1185233).\n- rtc: pcf2127: add tamper detection support (bsc#1185233).\n- rtc: pcf2127: add watchdog feature support (bsc#1185233).\n- rtc: pcf2127: bugfix: watchdog build dependency (bsc#1185233).\n- rtc: pcf2127: cleanup register and bit defines (bsc#1185233).\n- rtc: pcf2127: convert to devm_rtc_allocate_device (bsc#1185233).\n- rtc: pcf2127: fix a bug when not specify interrupts property (bsc#1185233).\n- rtc: pcf2127: fix alarm handling (bsc#1185233).\n- rtc: pcf2127: fix pcf2127_nvmem_read/write() returns (bsc#1185233).\n- rtc: pcf2127: handle boot-enabled watchdog feature (bsc#1185233).\n- rtc: pcf2127: handle timestamp interrupts (bsc#1185495).\n- rtc: pcf2127: let the core handle rtc range (bsc#1185233).\n- rtc: pcf2127: move watchdog initialisation to a separate function (bsc#1185233).\n- rtc: pcf2127: only use watchdog when explicitly available (bsc#1185233).\n- rtc: pcf2127: properly set flag WD_CD for rtc chips(pcf2129, pca2129) (bsc#1185233).\n- rtc: pcf2127: remove unnecessary #ifdef (bsc#1185233).\n- rtc: pcf2127: set regmap max_register (bsc#1185233).\n- rtc: pcf2127: watchdog: handle nowayout feature (bsc#1185233).\n- rtlwifi: 8821ae: upgrade PHY and RF parameters (git-fixes).\n- rtw88: Fix an error code in rtw_debugfs_set_rsvd_page() (git-fixes).\n- rtw88: Fix array overrun in rtw_get_tx_power_params() (git-fixes).\n- rtw88: coex: 8821c: correct antenna switch function (git-fixes).\n- s390/cio: return -EFAULT if copy_to_user() fails (git-fixes).\n- s390/cio: return -EFAULT if copy_to_user() fails (git-fixes).\n- s390/crypto: return -EFAULT if copy_to_user() fails (git-fixes).\n- s390/dasd: fix hanging DASD driver unbind (bsc#1183932 LTC#192153).\n- s390/dasd: fix hanging IO request during DASD driver unbind (git-fixes).\n- s390/entry: save the caller of psw_idle (bsc#1185677).\n- s390/ipl: support NVMe IPL kernel parameters (bsc#1185980 LTC#192679).\n- s390/kdump: fix out-of-memory with PCI (bsc#1182257 LTC#191375).\n- s390/pci: fix leak of PCI device structure (git-fixes).\n- s390/qeth: fix memory leak after failed TX Buffer allocation (git-fixes).\n- s390/qeth: fix notification for pending buffers during teardown (git-fixes).\n- s390/qeth: improve completion of pending TX buffers (git-fixes).\n- s390/qeth: schedule TX NAPI on QAOB completion (git-fixes).\n- s390/vtime: fix increased steal time accounting (bsc#1183859).\n- s390/zcrypt: return EIO when msg retry limit reached (git-fixes).\n- samples, bpf: Add missing munmap in xdpsock (bsc#1155518).\n- samples/bpf: Fix possible hang in xdpsock with multiple threads (bsc#1155518).\n- sata_mv: add IRQ checks (git-fixes).\n- sched/eas: Do not update misfit status if the task is pinned (git-fixes)\n- sched/fair: Avoid stale CPU util_est value for schedutil in (git-fixes)\n- sched/fair: Fix shift-out-of-bounds in load_balance() (git fixes (sched)).\n- sched/fair: Fix unfairness caused by missing load decay (git-fixes)\n- scripts/git_sort/git_sort.py: add bpf git repo\n- scsi: aacraid: Improve compat_ioctl handlers (bsc#1186352).\n- scsi: block: Fix a race in the runtime power management code (git-fixes).\n- scsi: core: Only return started requests from scsi_host_find_tag() (bsc#1179851).\n- scsi: core: Run queue in case of I/O resource contention failure (bsc#1186416).\n- scsi: core: add scsi_host_busy_iter() (bsc#1179851).\n- scsi: fnic: Kill \u0027exclude_id\u0027 argument to fnic_cleanup_io() (bsc#1179851).\n- scsi: fnic: Remove bogus ratelimit messages (bsc#1183249).\n- scsi: libfc: Avoid invoking response handler twice if ep is already completed (bsc#1186573).\n- scsi: lpfc: Add a option to enable interlocked ABTS before job completion (bsc#1186451).\n- scsi: lpfc: Add ndlp kref accounting for resume RPI path (bsc#1186451).\n- scsi: lpfc: Change wording of invalid pci reset log message (bsc#1182574).\n- scsi: lpfc: Copyright updates for 12.8.0.9 patches (bsc#1185472).\n- scsi: lpfc: Correct function header comments related to ndlp reference counting (bsc#1182574).\n- scsi: lpfc: Eliminate use of LPFC_DRIVER_NAME in lpfc_attr.c (bsc#1185472).\n- scsi: lpfc: Fix \u0027Unexpected timeout\u0027 error in direct attach topology (bsc#1186451).\n- scsi: lpfc: Fix ADISC handling that never frees nodes (bsc#1182574).\n- scsi: lpfc: Fix DMA virtual address ptr assignment in bsg (bsc#1185365).\n- scsi: lpfc: Fix FLOGI failure due to accessing a freed node (bsc#1182574).\n- scsi: lpfc: Fix NMI crash during rmmod due to circular hbalock dependency (bsc#1185472).\n- scsi: lpfc: Fix Node recovery when driver is handling simultaneous PLOGIs (bsc#1186451).\n- scsi: lpfc: Fix PLOGI ACC to be transmit after REG_LOGIN (bsc#1182574).\n- scsi: lpfc: Fix a bunch of kernel-doc issues (bsc#1185472).\n- scsi: lpfc: Fix a bunch of kernel-doc misdemeanours (bsc#1185472).\n- scsi: lpfc: Fix a bunch of misnamed functions (bsc#1185472).\n- scsi: lpfc: Fix a few incorrectly named functions (bsc#1185472).\n- scsi: lpfc: Fix a typo (bsc#1185472).\n- scsi: lpfc: Fix bad memory access during VPD DUMP mailbox command (bsc#1186451).\n- scsi: lpfc: Fix crash caused by switch reboot (bsc#1182574).\n- scsi: lpfc: Fix crash when a REG_RPI mailbox fails triggering a LOGO response (bsc#1185472).\n- scsi: lpfc: Fix crash when lpfc_sli4_hba_setup() fails to initialize the SGLs (bsc#1186451).\n- scsi: lpfc: Fix dropped FLOGI during pt2pt discovery recovery (bsc#1182574).\n- scsi: lpfc: Fix error handling for mailboxes completed in MBX_POLL mode (bsc#1185472).\n- scsi: lpfc: Fix formatting and misspelling issues (bsc#1185472).\n- scsi: lpfc: Fix gcc -Wstringop-overread warning (bsc#1185472).\n- scsi: lpfc: Fix illegal memory access on Abort IOCBs (bsc#1183203).\n- scsi: lpfc: Fix incorrect dbde assignment when building target abts wqe (bsc#1182574).\n- scsi: lpfc: Fix incorrect naming of __lpfc_update_fcf_record() (bsc#1185472).\n- scsi: lpfc: Fix incorrectly documented function lpfc_debugfs_commonxripools_data() (bsc#1185472).\n- scsi: lpfc: Fix kernel-doc formatting issue (bsc#1185472).\n- scsi: lpfc: Fix lack of device removal on port swaps with PRLIs (bsc#1185472).\n- scsi: lpfc: Fix lpfc_els_retry() possible null pointer dereference (bsc#1182574).\n- scsi: lpfc: Fix lpfc_hdw_queue attribute being ignored (bsc#1185472).\n- scsi: lpfc: Fix missing FDMI registrations after Mgmt Svc login (bsc#1185472).\n- scsi: lpfc: Fix node handling for Fabric Controller and Domain Controller (bsc#1186451).\n- scsi: lpfc: Fix nodeinfo debugfs output (bsc#1182574).\n- scsi: lpfc: Fix non-optimized ERSP handling (bsc#1186451).\n- scsi: lpfc: Fix null pointer dereference in lpfc_prep_els_iocb() (bsc#1182574).\n- scsi: lpfc: Fix pt2pt connection does not recover after LOGO (bsc#1182574).\n- scsi: lpfc: Fix pt2pt state transition causing rmmod hang (bsc#1182574).\n- scsi: lpfc: Fix reference counting errors in lpfc_cmpl_els_rsp() (bsc#1185472).\n- scsi: lpfc: Fix reftag generation sizing errors (bsc#1182574).\n- scsi: lpfc: Fix rmmod crash due to bad ring pointers to abort_iotag (bsc#1185472).\n- scsi: lpfc: Fix silent memory allocation failure in lpfc_sli4_bsg_link_diag_test() (bsc#1185472).\n- scsi: lpfc: Fix some error codes in debugfs (bsc#1185472).\n- scsi: lpfc: Fix stale node accesses on stale RRQ request (bsc#1182574).\n- scsi: lpfc: Fix status returned in lpfc_els_retry() error exit path (bsc#1182574).\n- scsi: lpfc: Fix unnecessary null check in lpfc_release_scsi_buf (bsc#1182574).\n- scsi: lpfc: Fix unreleased RPIs when NPIV ports are created (bsc#1186451).\n- scsi: lpfc: Fix use after free in lpfc_els_free_iocb (bsc#1182574).\n- scsi: lpfc: Fix use-after-free on unused nodes after port swap (bsc#1185472).\n- scsi: lpfc: Fix various trivial errors in comments and log messages (bsc#1185472).\n- scsi: lpfc: Fix vport indices in lpfc_find_vport_by_vpid() (bsc#1182574).\n- scsi: lpfc: Ignore GID-FT response that may be received after a link flip (bsc#1186451).\n- scsi: lpfc: Reduce LOG_TRACE_EVENT logging for vports (bsc#1182574).\n- scsi: lpfc: Remove unsupported mbox PORT_CAPABILITIES logic (bsc#1185472).\n- scsi: lpfc: Reregister FPIN types if ELS_RDF is received from fabric controller (bsc#1186451).\n- scsi: lpfc: Standardize discovery object logging format (bsc#1185472).\n- scsi: lpfc: Update copyrights for 12.8.0.7 and 12.8.0.8 changes (bsc#1182574).\n- scsi: lpfc: Update lpfc version to 12.8.0.10 (bsc#1186451).\n- scsi: lpfc: Update lpfc version to 12.8.0.8 (bsc#1182574).\n- scsi: lpfc: Update lpfc version to 12.8.0.9 (bsc#1185472).\n- scsi: mpt3sas: Only one vSES is present even when IOC has multi vSES (bsc#1185954).\n- scsi: pm80xx: Do not sleep in atomic context (bsc#1186353).\n- scsi: pm80xx: Fix chip initialization failure (bsc#1186354).\n- scsi: pm80xx: Fix potential infinite loop (bsc#1186354).\n- scsi: pm80xx: Increase timeout for pm80xx mpi_uninit_check() (bsc#1186355).\n- scsi: qla2xxx: Add H:C:T info in the log message for fc ports (bsc#1185491).\n- scsi: qla2xxx: Add error counters to debugfs node (bsc#1185491).\n- scsi: qla2xxx: Always check the return value of qla24xx_get_isp_stats() (bsc#1185491).\n- scsi: qla2xxx: Assign boolean values to a bool variable (bsc#1185491).\n- scsi: qla2xxx: Check kzalloc() return value (bsc#1185491).\n- scsi: qla2xxx: Consolidate zio threshold setting for both FCP \u0026 NVMe (bsc#1185491).\n- scsi: qla2xxx: Constify struct qla_tgt_func_tmpl (bsc#1185491).\n- scsi: qla2xxx: Do logout even if fabric scan retries got exhausted (bsc#1185491).\n- scsi: qla2xxx: Enable NVMe CONF (BIT_7) when enabling SLER (bsc#1185491).\n- scsi: qla2xxx: Fix IOPS drop seen in some adapters (bsc#1185491).\n- scsi: qla2xxx: Fix RISC RESET completion polling (bsc#1185491).\n- scsi: qla2xxx: Fix a couple of misdocumented functions (bsc#1185491).\n- scsi: qla2xxx: Fix a couple of misnamed functions (bsc#1185491).\n- scsi: qla2xxx: Fix broken #endif placement (bsc#1185491).\n- scsi: qla2xxx: Fix crash in PCIe error handling (bsc#1185491).\n- scsi: qla2xxx: Fix crash in qla2xxx_mqueuecommand() (bsc#1185491).\n- scsi: qla2xxx: Fix endianness annotations (bsc#1185491).\n- scsi: qla2xxx: Fix incorrectly named function qla8044_check_temp() (bsc#1185491).\n- scsi: qla2xxx: Fix mailbox Ch erroneous error (bsc#1185491).\n- scsi: qla2xxx: Fix mailbox recovery during PCIe error (bsc#1185491).\n- scsi: qla2xxx: Fix some incorrect formatting/spelling issues (bsc#1185491).\n- scsi: qla2xxx: Fix some memory corruption (bsc#1185491).\n- scsi: qla2xxx: Fix stuck session (bsc#1185491).\n- scsi: qla2xxx: Fix use after free in bsg (bsc#1185491).\n- scsi: qla2xxx: Implementation to get and manage host, target stats and initiator port (bsc#1185491).\n- scsi: qla2xxx: Move some messages from debug to normal log level (bsc#1185491).\n- scsi: qla2xxx: Remove redundant NULL check (bsc#1185491).\n- scsi: qla2xxx: Remove unnecessary NULL check (bsc#1185491).\n- scsi: qla2xxx: Remove unneeded if-null-free check (bsc#1185491).\n- scsi: qla2xxx: Replace __qla2x00_marker()\u0027s missing underscores (bsc#1185491).\n- scsi: qla2xxx: Reserve extra IRQ vectors (bsc#1184436).\n- scsi: qla2xxx: Reuse existing error handling path (bsc#1185491).\n- scsi: qla2xxx: Simplify if statement (bsc#1185491).\n- scsi: qla2xxx: Simplify qla8044_minidump_process_control() (bsc#1185491).\n- scsi: qla2xxx: Simplify the calculation of variables (bsc#1185491).\n- scsi: qla2xxx: Suppress Coverity complaints about dseg_r* (bsc#1185491).\n- scsi: qla2xxx: Update default AER debug mask (bsc#1185491).\n- scsi: qla2xxx: Update version to 10.02.00.105-k (bsc#1185491).\n- scsi: qla2xxx: Update version to 10.02.00.106-k (bsc#1185491).\n- scsi: qla2xxx: Use dma_pool_zalloc() (bsc#1185491).\n- scsi: qla2xxx: Wait for ABTS response on I/O timeouts for NVMe (bsc#1185491).\n- scsi: qla2xxx: fc_remote_port_chkready() returns a SCSI result value (bsc#1185491).\n- scsi: smartpqi: Correct driver removal with HBA disks (bsc#1178089).\n- scsi: smartpqi: Correct driver removal with HBA disks (bsc#1178089).\n- scsi: smartpqi: Correct pqi_sas_smp_handler busy condition (bsc#1178089).\n- scsi: smartpqi: Correct pqi_sas_smp_handler busy condition (bsc#1178089).\n- scsi: smartpqi: Update version to 1.2.16-012 (bsc#1178089).\n- scsi: smartpqi: Update version to 1.2.16-012 (bsc#1178089).\n- scsi: target: pscsi: Avoid OOM in pscsi_map_sg() (bsc#1183843).\n- scsi: target: pscsi: Clean up after failure in pscsi_map_sg() (bsc#1183843).\n- scsi: target: tcmu: Fix use-after-free of se_cmd-\u003epriv (bsc#1186356).\n- scsi: target: tcmu: Fix warning: \u0027page\u0027 may be used uninitialized (bsc#1186357).\n- sctp: delay auto_asconf init until binding the first addr (\u0026lt;cover.1620748346.git.mkubecek@suse.cz\u003e).\n- security: keys: trusted: fix TPM2 authorizations (git-fixes).\n- selftests/bpf: Fix BPF_CORE_READ_BITFIELD() macro (bsc#1177028).\n- selftests/bpf: Fix the ASSERT_ERR_PTR macro (bsc#1177028).\n- selftests/bpf: Mask bpf_csum_diff() return value to 16 bits in test_verifier (bsc#1155518).\n- selftests/bpf: No need to drop the packet when there is no geneve opt (bsc#1155518).\n- selftests/bpf: Re-generate vmlinux.h and BPF skeletons if bpftool changed (bsc#1177028).\n- selftests/bpf: Set gopt opt_class to 0 if get tunnel opt failed (bsc#1155518).\n- selftests/powerpc: Add pkey helpers for rights (bsc#1184934 ltc#191460).\n- selftests/powerpc: Add test for execute-disabled pkeys (bsc#1184934 ltc#191460).\n- selftests/powerpc: Add test for pkey siginfo verification (bsc#1184934 ltc#191460).\n- selftests/powerpc: Add wrapper for gettid (bsc#1184934 ltc#191460).\n- selftests/powerpc: Fix L1D flushing tests for Power10 (bsc#1184934 ltc#191460).\n- selftests/powerpc: Fix exit status of pkey tests (bsc#1184934 ltc#191460).\n- selftests/powerpc: Fix pkey syscall redefinitions (bsc#1184934 ltc#191460).\n- selftests/powerpc: Move pkey helpers to headers (bsc#1184934 ltc#191460).\n- selftests/powerpc: refactor entry and rfi_flush tests (bsc#1184934 ltc#191460).\n- selftests: mlxsw: Remove a redundant if statement in tc_flower_scale test (bsc#1176774).\n- selinux: Fix error return code in sel_ib_pkey_sid_slow() (git-fixes).\n- selinux: fix error initialization in inode_doinit_with_dentry() (git-fixes).\n- selinux: fix inode_doinit_with_dentry() LABEL_INVALID error handling (git-fixes).\n- serial: core: fix suspicious security_locked_down() call (git-fixes).\n- serial: core: return early on unsupported ioctls (git-fixes).\n- serial: sh-sci: Fix off-by-one error in FIFO threshold register setting (git-fixes).\n- serial: stm32: fix incorrect characters on console (git-fixes).\n- serial: stm32: fix tx_empty condition (git-fixes).\n- serial: tegra: Fix a mask operation that is always true (git-fixes).\n- smb3: Fix out-of-bounds bug in SMB2_negotiate() (bsc#1183540).\n- smb3: add dynamic trace point to trace when credits obtained (bsc#1181507).\n- smb3: fix crediting for compounding when only one request in flight (bsc#1181507).\n- smc: disallow TCP_ULP in smc_setsockopt() (git-fixes).\n- soc/fsl: qbman: fix conflicting alignment attributes (git-fixes).\n- soc: aspeed: fix a ternary sign expansion bug (git-fixes).\n- soc: fsl: qe: replace qe_io{read,write}* wrappers by generic io{read,write}* (git-fixes).\n- soc: qcom: mdt_loader: Detect truncated read of segments (git-fixes).\n- soc: qcom: mdt_loader: Validate that p_filesz \u0026lt; p_memsz (git-fixes).\n- software node: Fix node registration (git-fixes).\n- soundwire: bus: Fix device found flag correctly (git-fixes).\n- soundwire: stream: fix memory leak in stream config error path (git-fixes).\n- spi: Introduce dspi_slave_abort() function for NXP\u0027s dspi SPI driver (bsc#1167260).\n- spi: ath79: always call chipselect function (git-fixes).\n- spi: ath79: remove spi-master setup and cleanup assignment (git-fixes).\n- spi: cadence: set cqspi to the driver_data field of struct device (git-fixes).\n- spi: dln2: Fix reference leak to master (git-fixes).\n- spi: fsl-dspi: fix NULL pointer dereference (bsc#1167260).\n- spi: fsl-dspi: fix use-after-free in remove path (bsc#1167260).\n- spi: fsl-dspi: fix wrong pointer in suspend/resume (bsc#1167260).\n- spi: fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware() (git-fixes).\n- spi: omap-100k: Fix reference leak to master (git-fixes).\n- spi: qup: fix PM reference leak in spi_qup_remove() (git-fixes).\n- spi: spi-fsl-dspi: Accelerate transfers using larger word size if possible (bsc#1167260).\n- spi: spi-fsl-dspi: Add comments around dspi_pop_tx and dspi_push_rx functions (bsc#1167260).\n- spi: spi-fsl-dspi: Add support for LS1028A (bsc#1167260).\n- spi: spi-fsl-dspi: Adding shutdown hook (bsc#1167260).\n- spi: spi-fsl-dspi: Always use the TCFQ devices in poll mode (bsc#1167260).\n- spi: spi-fsl-dspi: Avoid NULL pointer in dspi_slave_abort for non-DMA mode (bsc#1167260).\n- spi: spi-fsl-dspi: Avoid reading more data than written in EOQ mode (bsc#1167260).\n- spi: spi-fsl-dspi: Change usage pattern of SPI_MCR_* and SPI_CTAR_* macros (bsc#1167260).\n- spi: spi-fsl-dspi: Convert TCFQ users to XSPI FIFO mode (bsc#1167260).\n- spi: spi-fsl-dspi: Convert the instantiations that support it to DMA (bsc#1167260).\n- spi: spi-fsl-dspi: Demistify magic value in SPI_SR_CLEAR (bsc#1167260).\n- spi: spi-fsl-dspi: Do not access reserved fields in SPI_MCR (bsc#1167260).\n- spi: spi-fsl-dspi: Do not mask off undefined bits (bsc#1167260).\n- spi: spi-fsl-dspi: Exit the ISR with IRQ_NONE when it\u0027s not ours (bsc#1167260).\n- spi: spi-fsl-dspi: Fix 16-bit word order in 32-bit XSPI mode (bsc#1167260).\n- spi: spi-fsl-dspi: Fix a resource leak in an error handling path (git-fixes).\n- spi: spi-fsl-dspi: Fix bits-per-word acceleration in DMA mode (bsc#1167260).\n- spi: spi-fsl-dspi: Fix code alignment (bsc#1167260).\n- spi: spi-fsl-dspi: Fix external abort on interrupt in resume or exit paths (bsc#1167260).\n- spi: spi-fsl-dspi: Fix interrupt-less DMA mode taking an XSPI code path (bsc#1167260).\n- spi: spi-fsl-dspi: Fix little endian access to PUSHR CMD and TXDATA (bsc#1167260).\n- spi: spi-fsl-dspi: Fix lockup if device is removed during SPI transfer (bsc#1167260).\n- spi: spi-fsl-dspi: Fix lockup if device is shutdown during SPI transfer (bsc#1167260).\n- spi: spi-fsl-dspi: Fix race condition in TCFQ/EOQ interrupt (bsc#1167260).\n- spi: spi-fsl-dspi: Fix typos (bsc#1167260).\n- spi: spi-fsl-dspi: Free DMA memory with matching function (bsc#1167260).\n- spi: spi-fsl-dspi: Implement .max_message_size method for EOQ mode (bsc#1167260).\n- spi: spi-fsl-dspi: Initialize completion before possible interrupt (bsc#1167260).\n- spi: spi-fsl-dspi: LS2080A and LX2160A support XSPI mode (bsc#1167260).\n- spi: spi-fsl-dspi: Make bus-num property optional (bsc#1167260).\n- spi: spi-fsl-dspi: Move dspi_interrupt above dspi_transfer_one_message (bsc#1167260).\n- spi: spi-fsl-dspi: Move invariant configs out of dspi_transfer_one_message (bsc#1167260).\n- spi: spi-fsl-dspi: Optimize dspi_setup_accel for lowest interrupt count (bsc#1167260).\n- spi: spi-fsl-dspi: Parameterize the FIFO size and DMA buffer size (bsc#1167260).\n- spi: spi-fsl-dspi: Protect against races on dspi-\u003ewords_in_flight (bsc#1167260).\n- spi: spi-fsl-dspi: Reduce indentation in dspi_release_dma() (bsc#1167260).\n- spi: spi-fsl-dspi: Reduce indentation level in dspi_interrupt (bsc#1167260).\n- spi: spi-fsl-dspi: Remove impossible to reach error check (bsc#1167260).\n- spi: spi-fsl-dspi: Remove pointless assignment of master-\u003etransfer to NULL (bsc#1167260).\n- spi: spi-fsl-dspi: Remove unused chip-\u003evoid_write_data (bsc#1167260).\n- spi: spi-fsl-dspi: Remove unused defines and includes (bsc#1167260).\n- spi: spi-fsl-dspi: Remove unused initialization of \u0027ret\u0027 in dspi_probe (bsc#1167260).\n- spi: spi-fsl-dspi: Rename fifo_{read,write} and {tx,cmd}_fifo_write (bsc#1167260).\n- spi: spi-fsl-dspi: Replace interruptible wait queue with a simple completion (bsc#1167260).\n- spi: spi-fsl-dspi: Replace legacy spi_master names with spi_controller (bsc#1167260).\n- spi: spi-fsl-dspi: Simplify bytes_per_word gymnastics (bsc#1167260).\n- spi: spi-fsl-dspi: Take software timestamp in dspi_fifo_write (bsc#1167260).\n- spi: spi-fsl-dspi: Use BIT() and GENMASK() macros (bsc#1167260).\n- spi: spi-fsl-dspi: Use EOQ for last word in buffer even for XSPI mode (bsc#1167260).\n- spi: spi-fsl-dspi: Use dma_request_chan() instead dma_request_slave_channel() (bsc#1167260).\n- spi: spi-fsl-dspi: Use poll mode in case the platform IRQ is missing (bsc#1167260).\n- spi: spi-fsl-dspi: Use reverse Christmas tree declaration order (bsc#1167260).\n- spi: spi-fsl-dspi: Use specific compatible strings for all SoC instantiations (bsc#1167260).\n- spi: spi-fsl-dspi: delete EOQ transfer mode (bsc#1167260).\n- spi: spi-fsl-dspi: fix DMA mapping (bsc#1167260).\n- spi: spi-fsl-dspi: fix native data copy (bsc#1167260).\n- spi: spi-fsl-dspi: remove git-fixes Remove git-fixes. Prepare to update the driver. References: bsc#1167260\n- spi: spi-fsl-dspi: set ColdFire to DMA mode (bsc#1167260).\n- spi: spi-fsl-dspi: use XSPI mode instead of DMA for DPAA2 SoCs (bsc#1167260).\n- spi: spi-ti-qspi: Free DMA resources (git-fixes).\n- spi: stm32: make spurious and overrun interrupts visible (git-fixes).\n- squashfs: fix inode lookup sanity checks (bsc#1183750).\n- squashfs: fix xattr id and id lookup sanity checks (bsc#1183750).\n- staging: bcm2835-audio: Replace unsafe strcpy() with strscpy() (git-fixes).\n- staging: comedi: addi_apci_1032: Fix endian problem for COS sample (git-fixes).\n- staging: comedi: addi_apci_1500: Fix endian problem for command sample (git-fixes).\n- staging: comedi: adv_pci1710: Fix endian problem for AI command data (git-fixes).\n- staging: comedi: cb_pcidas64: fix request_irq() warn (git-fixes).\n- staging: comedi: cb_pcidas: fix request_irq() warn (git-fixes).\n- staging: comedi: das6402: Fix endian problem for AI command data (git-fixes).\n- staging: comedi: das800: Fix endian problem for AI command data (git-fixes).\n- staging: comedi: dmm32at: Fix endian problem for AI command data (git-fixes).\n- staging: comedi: me4000: Fix endian problem for AI command data (git-fixes).\n- staging: comedi: pcl711: Fix endian problem for AI command data (git-fixes).\n- staging: comedi: pcl818: Fix endian problem for AI command data (git-fixes).\n- staging: emxx_udc: fix loop in _nbu2ss_nuke() (git-fixes).\n- staging: fwserial: Fix error handling in fwserial_create (git-fixes).\n- staging: fwserial: fix TIOCGSERIAL implementation (git-fixes).\n- staging: fwserial: fix TIOCSSERIAL implementation (git-fixes).\n- staging: fwserial: fix TIOCSSERIAL jiffies conversions (git-fixes).\n- staging: fwserial: fix TIOCSSERIAL permission check (git-fixes).\n- staging: iio: cdc: ad7746: avoid overwrite of num_channels (git-fixes).\n- staging: ks7010: prevent buffer overflow in ks_wlan_set_scan() (git-fixes).\n- staging: most: sound: add sanity check for function argument (git-fixes).\n- staging: rtl8188eu: fix potential memory corruption in rtw_check_beacon_data() (git-fixes).\n- staging: rtl8188eu: prevent -\u003essid overflow in rtw_wx_set_scan() (git-fixes).\n- staging: rtl8192e: Change state information from u16 to u8 (git-fixes).\n- staging: rtl8192e: Fix incorrect source in memcpy() (git-fixes).\n- staging: rtl8192e: Fix possible buffer overflow in _rtl92e_wx_set_scan (git-fixes).\n- staging: rtl8192u: Fix potential infinite loop (git-fixes).\n- staging: rtl8192u: fix -\u003essid overflow in r8192_wx_set_scan() (git-fixes).\n- staging: rtl8712: Fix possible buffer overflow in r8712_sitesurvey_cmd (git-fixes).\n- staging: rtl8712: unterminated string leads to read overflow (git-fixes).\n- stop_machine: mark helpers __always_inline (git-fixes).\n- supported.conf:\n- supported.conf: add bsc1185010 dependency\n- supported.conf: mark usb_otg_fsm as supported (bsc#1185010)\n- tcp: fix to update snd_wl1 in bulk receiver fast path (\u0026lt;cover.1620748346.git.mkubecek@suse.cz\u003e).\n- tee: optee: remove need_resched() before cond_resched() (git-fixes).\n- tee: optee: replace might_sleep with cond_resched (git-fixes).\n- thermal/core: Add NULL pointer check before using cooling device stats (git-fixes).\n- thermal/drivers/cpufreq_cooling: Update cpufreq_state only if state has changed (git-fixes).\n- thermal/drivers/ti-soc-thermal/bandgap Remove unused variable \u0027val\u0027 (git-fixes).\n- thermal: thermal_of: Fix error return code of thermal_of_populate_bind_params() (git-fixes).\n- thunderbolt: Fix a leak in tb_retimer_add() (git-fixes).\n- thunderbolt: Fix a leak in tb_retimer_add() (git-fixes).\n- thunderbolt: Fix off by one in tb_port_find_retimer() (git-fixes).\n- thunderbolt: Fix off by one in tb_port_find_retimer() (git-fixes).\n- thunderbolt: Initialize HopID IDAs in tb_switch_alloc() (git-fixes).\n- thunderbolt: dma_port: Fix NVM read buffer bounds and offset issue (git-fixes).\n- tools/resolve_btfids: Fix build error with older host toolchains (bsc#1177028).\n- tpm: acpi: Check eventlog signature before using it (git-fixes).\n- tracing: Map all PIDs to command lines (git-fixes).\n- tty: amiserial: fix TIOCSSERIAL permission check (git-fixes).\n- tty: fix memory leak in vc_deallocate (git-fixes).\n- tty: moxa: fix TIOCSSERIAL jiffies conversions (git-fixes).\n- tty: moxa: fix TIOCSSERIAL permission check (git-fixes).\n- tty: serial: lpuart: fix lpuart32_write usage (git-fixes).\n- tty: serial: ucc_uart: replace qe_io{read,write}* wrappers by generic io{read,write}* (git-fixes).\n- udlfb: Fix memory leak in dlfb_usb_probe (git-fixes).\n- uio: uio_hv_generic: use devm_kzalloc() for private data alloc (git-fixes).\n- uio_hv_generic: Fix a memory leak in error handling paths (git-fixes).\n- uio_hv_generic: Fix another memory leak in error handling paths (git-fixes).\n- uio_hv_generic: add missed sysfs_remove_bin_file (git-fixes).\n- usb-storage: Add quirk to defeat Kindle\u0027s automatic unload (git-fixes).\n- usb: Remove dev_err() usage after platform_get_irq() (git-fixes).\n- usb: core: hub: Fix PM reference leak in usb_port_resume() (git-fixes).\n- usb: core: hub: fix race condition about TRSMRCY of resume (git-fixes).\n- usb: dwc2: Fix HPRT0.PrtSusp bit setting for HiKey 960 board (git-fixes).\n- usb: dwc2: Fix gadget DMA unmap direction (git-fixes).\n- usb: dwc2: Fix hibernation between host and device modes (git-fixes).\n- usb: dwc2: Fix host mode hibernation exit with remote wakeup flow (git-fixes).\n- usb: dwc2: Fix session request interrupt handler (git-fixes).\n- usb: dwc2: Prevent core suspend when port connection flag is 0 (git-fixes).\n- usb: dwc3: Switch to use device_property_count_u32() (git-fixes).\n- usb: dwc3: Update soft-reset wait polling rate (git-fixes).\n- usb: dwc3: gadget: Enable suspend events (git-fixes).\n- usb: dwc3: gadget: Fix START_TRANSFER link state check (git-fixes).\n- usb: dwc3: gadget: Return success always for kick transfer in ep queue (git-fixes).\n- usb: dwc3: keystone: use devm_platform_ioremap_resource() to simplify code (git-fixes).\n- usb: dwc3: meson-g12a: use devm_platform_ioremap_resource() to simplify code (git-fixes).\n- usb: dwc3: omap: improve extcon initialization (git-fixes).\n- usb: dwc3: pci: Enable usb2-gadget-lpm-disable for Intel Merrifield (git-fixes).\n- usb: dwc3: qcom: Add missing DWC3 OF node refcount decrement (git-fixes).\n- usb: dwc3: qcom: Honor wakeup enabled/disabled state (git-fixes).\n- usb: fotg210-hcd: Fix an error message (git-fixes).\n- usb: gadget/function/f_fs string table fix for multiple languages (git-fixes).\n- usb: gadget: Fix double free of device descriptor pointers (git-fixes).\n- usb: gadget: aspeed: fix dma map failure (git-fixes).\n- usb: gadget: configfs: Fix KASAN use-after-free (git-fixes).\n- usb: gadget: dummy_hcd: fix gpf in gadget_setup (git-fixes).\n- usb: gadget: f_uac1: stop playback on function disable (git-fixes).\n- usb: gadget: f_uac1: validate input parameters (git-fixes).\n- usb: gadget: f_uac2: always increase endpoint max_packet_size by one audio slot (git-fixes).\n- usb: gadget: f_uac2: validate input parameters (git-fixes).\n- usb: gadget: pch_udc: Check for DMA mapping error (git-fixes).\n- usb: gadget: pch_udc: Check if driver is present before calling -\u003esetup() (git-fixes).\n- usb: gadget: pch_udc: Move pch_udc_init() to satisfy kernel doc (git-fixes).\n- usb: gadget: pch_udc: Replace cpu_to_le32() by lower_32_bits() (git-fixes).\n- usb: gadget: pch_udc: Revert d3cb25a12138 completely (git-fixes).\n- usb: gadget: r8a66597: Add missing null check on return from platform_get_resource (git-fixes).\n- usb: gadget: udc: amd5536udc_pci fix null-ptr-dereference (git-fixes).\n- usb: gadget: udc: renesas_usb3: Fix a race in usb3_start_pipen() (git-fixes).\n- usb: gadget: uvc: add bInterval checking for HS mode (git-fixes).\n- usb: musb: Fix suspend with devices connected for a64 (git-fixes).\n- usb: musb: fix PM reference leak in musb_irq_work() (git-fixes).\n- usb: pci-quirks: disable D3cold on xhci suspend for s2idle on AMD Renoire (bsc#1185840).\n- usb: renesas_usbhs: Clear PIPECFG for re-enabling pipe with other EPNUM (git-fixes).\n- usb: roles: Call try_module_get() from usb_role_switch_find_by_fwnode() (git-fixes).\n- usb: roles: Call try_module_get() from usb_role_switch_find_by_fwnode() (git-fixes).\n- usb: sl811-hcd: improve misleading indentation (git-fixes).\n- usb: typec: Remove vdo[3] part of tps6598x_rx_identity_reg struct (git-fixes).\n- usb: typec: tcpci: Check ROLE_CONTROL while interpreting CC_STATUS (git-fixes).\n- usb: typec: tcpm: Address incorrect values of tcpm psy for fixed supply (git-fixes).\n- usb: typec: tcpm: Honour pSnkStdby requirement during negotiation (git-fixes).\n- usb: typec: tcpm: Invoke power_supply_changed for tcpm-source-psy- (git-fixes).\n- usb: typec: tcpm: Invoke power_supply_changed for tcpm-source-psy- (git-fixes).\n- usb: typec: tps6598x: Fix return value check in tps6598x_probe() (git-fixes).\n- usb: typec: tps6598x: Fix return value check in tps6598x_probe() (git-fixes).\n- usb: typec: ucsi: Put fwnode in any case during -\u003eprobe() (git-fixes).\n- usb: webcam: Invalid size of Processing Unit Descriptor (git-fixes).\n- usb: xhci-mtk: fix broken streams issue on 0.96 xHCI (git-fixes).\n- usb: xhci-mtk: improve bandwidth scheduling with TT (git-fixes).\n- usb: xhci-mtk: remove or operator for setting schedule parameters (git-fixes).\n- usb: xhci: Fix ASMedia ASM1042A and ASM3242 DMA addressing (git-fixes).\n- usb: xhci: Fix port minor revision (git-fixes).\n- usb: xhci: Increase timeout for HC halt (git-fixes).\n- usb: xhci: do not perform Soft Retry for some xHCI hosts (git-fixes).\n- usbip: Fix incorrect double assignment to udc-\u003eud.tcp_rx (git-fixes).\n- usbip: fix stub_dev to check for stream socket (git-fixes).\n- usbip: fix stub_dev usbip_sockfd_store() races leading to gpf (git-fixes).\n- usbip: fix vhci_hcd attach_store() races leading to gpf (git-fixes).\n- usbip: fix vhci_hcd to check for stream socket (git-fixes).\n- usbip: fix vudc to check for stream socket (git-fixes).\n- usbip: fix vudc usbip_sockfd_store races leading to gpf (git-fixes).\n- usbip: tools: fix build error for multiple definition (git-fixes).\n- usbip: vhci_hcd fix shift out-of-bounds in vhci_hub_control() (git-fixes).\n- use __netdev_notify_peers in ibmvnic (bsc#1183871 ltc#192139).\n- veth: Store queue_mapping independently of XDP prog presence (git-fixes).\n- vfio-pci/zdev: fix possible segmentation fault issue (git-fixes).\n- vfio/iommu_type1: Populate full dirty when detach non-pinned group (bsc#1183326).\n- vfio/mdev: Do not allow a mdev_type to have a NULL parent pointer (git-fixes).\n- vfio/mdev: Make to_mdev_device() into a static inline (git-fixes).\n- vfio/pci: Add missing range check in vfio_pci_mmap (git-fixes).\n- vfio/pci: Move VGA and VF initialization to functions (git-fixes).\n- vfio/pci: Re-order vfio_pci_probe() (git-fixes).\n- vgacon: Record video mode changes with VT_RESIZEX (git-fixes).\n- video: fbdev: acornfb: remove free_unused_pages() (bsc#1152489)\n- video: hyperv_fb: Add ratelimit on error message (bsc#1185725).\n- video: hyperv_fb: Fix a double free in hvfb_probe (git-fixes).\n- virt_wifi: Return micros for BSS TSF values (git-fixes).\n- virtiofs: fix memory leak in virtio_fs_probe() (bsc#1185558).\n- vrf: fix a comment about loopback device (git-fixes).\n- vt/consolemap: do font sum unsigned (git-fixes).\n- vxlan: do not modify the shared tunnel info when PMTU triggers an ICMP reply (bsc#1176447).\n- vxlan: move debug check after netdev unregister (git-fixes).\n- watchdog/softlockup: Remove obsolete check of last reported task (bsc#1185982).\n- watchdog/softlockup: report the overall time of softlockups (bsc#1185982).\n- watchdog: explicitly update timestamp when reporting softlockup (bsc#1185982).\n- watchdog: rename __touch_watchdog() to a better descriptive name (bsc#1185982).\n- whitespace cleanup\n- wl3501_cs: Fix out-of-bounds warnings in wl3501_mgmt_join (git-fixes).\n- wl3501_cs: Fix out-of-bounds warnings in wl3501_send_pkt (git-fixes).\n- wlcore: Fix command execute failure 19 for wl12xx (git-fixes).\n- workqueue: Minor follow-ups to the rescuer destruction change (bsc#1185911).\n- workqueue: Move the position of debug_work_activate() in __queue_work() (bsc#1184893).\n- workqueue: more destroy_workqueue() fixes (bsc#1185911).\n- x86,swiotlb: Adjust SWIOTLB bounce buffer size for SEV guests (bsc#1186219).\n- x86/cpu: Initialize MSR_TSC_AUX if RDTSCP *or* RDPID is supported (bsc#1152489).\n- x86/crash: Fix crash_setup_memmap_entries() out-of-bounds access (bsc#1152489).\n- x86/fsgsbase/64: Fix NULL deref in 86_fsgsbase_read_task (bsc#1152489).\n- x86/insn: Add some Intel instructions to the opcode map (bsc#1184760).\n- x86/insn: Add some more Intel instructions to the opcode map (bsc#1184760).\n- x86/ioapic: Ignore IRQ2 again (bsc#1152489).\n- x86/mem_encrypt: Correct physical address calculation in __set_clr_pte_enc() (bsc#1152489).\n- x86/microcode: Check for offline CPUs before requesting new microcode (bsc#1152489).\n- x86/mm: Fix NX bit clearing issue in kernel_map_pages_in_pgd (bsc#1152489).\n- x86/platform/uv: Set section block size for hubless architectures (bsc#1152489).\n- x86/reboot: Force all cpus to exit VMX root if VMX is supported (bsc#1152489).\n- x86/sev-es: Invalidate the GHCB after completing VMGEXIT (bsc#1178134).\n- x86/sev-es: Move sev_es_put_ghcb() in prep for follow on patch (bsc#1178134).\n- x86: Introduce TS_COMPAT_RESTART to fix get_nr_restart_syscall() (bsc#1152489).\n- xen/events: avoid handling the same event on two cpus at the same time (git-fixes).\n- xen/events: do not unmask an event channel when an eoi is pending (git-fixes).\n- xen/events: reset affinity of 2-level event when tearing it down (git-fixes).\n- xen/evtchn: Change irq_info lock to raw_spinlock_t (git-fixes). \n- xfrm: Provide private skb extensions for segmented and hw offloaded ESP packets (bsc#1176447).\n- xfs: group quota should return EDQUOT when prj quota enabled (bsc#1180980).\n- xhci: Do not use GFP_KERNEL in (potentially) atomic context (git-fixes).\n- xhci: Fix repeated xhci wake after suspend due to uncleared internal wake state (git-fixes).\n- xhci: Improve detection of device initiated wake signal (git-fixes).\n- xhci: check control context is valid before dereferencing it (git-fixes).\n- xhci: fix potential array out of bounds with several interrupters (git-fixes).\n- xsk: Respect device\u0027s headroom and tailroom on generic xmit path (git-fixes).\n- xsk: Respect device\u0027s headroom and tailroom on generic xmit path (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-1975,SUSE-SLE-Module-Public-Cloud-15-SP3-2021-1975",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_1975-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:1975-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20211975-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:1975-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html"
},
{
"category": "self",
"summary": "SUSE Bug 1043990",
"url": "https://bugzilla.suse.com/1043990"
},
{
"category": "self",
"summary": "SUSE Bug 1047233",
"url": "https://bugzilla.suse.com/1047233"
},
{
"category": "self",
"summary": "SUSE Bug 1055117",
"url": "https://bugzilla.suse.com/1055117"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1087082",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "self",
"summary": "SUSE Bug 1113295",
"url": "https://bugzilla.suse.com/1113295"
},
{
"category": "self",
"summary": "SUSE Bug 1133021",
"url": "https://bugzilla.suse.com/1133021"
},
{
"category": "self",
"summary": "SUSE Bug 1152457",
"url": "https://bugzilla.suse.com/1152457"
},
{
"category": "self",
"summary": "SUSE Bug 1152472",
"url": "https://bugzilla.suse.com/1152472"
},
{
"category": "self",
"summary": "SUSE Bug 1152489",
"url": "https://bugzilla.suse.com/1152489"
},
{
"category": "self",
"summary": "SUSE Bug 1153274",
"url": "https://bugzilla.suse.com/1153274"
},
{
"category": "self",
"summary": "SUSE Bug 1154353",
"url": "https://bugzilla.suse.com/1154353"
},
{
"category": "self",
"summary": "SUSE Bug 1155518",
"url": "https://bugzilla.suse.com/1155518"
},
{
"category": "self",
"summary": "SUSE Bug 1156256",
"url": "https://bugzilla.suse.com/1156256"
},
{
"category": "self",
"summary": "SUSE Bug 1156395",
"url": "https://bugzilla.suse.com/1156395"
},
{
"category": "self",
"summary": "SUSE Bug 1159280",
"url": "https://bugzilla.suse.com/1159280"
},
{
"category": "self",
"summary": "SUSE Bug 1160634",
"url": "https://bugzilla.suse.com/1160634"
},
{
"category": "self",
"summary": "SUSE Bug 1164648",
"url": "https://bugzilla.suse.com/1164648"
},
{
"category": "self",
"summary": "SUSE Bug 1167260",
"url": "https://bugzilla.suse.com/1167260"
},
{
"category": "self",
"summary": "SUSE Bug 1167574",
"url": "https://bugzilla.suse.com/1167574"
},
{
"category": "self",
"summary": "SUSE Bug 1167773",
"url": "https://bugzilla.suse.com/1167773"
},
{
"category": "self",
"summary": "SUSE Bug 1168777",
"url": "https://bugzilla.suse.com/1168777"
},
{
"category": "self",
"summary": "SUSE Bug 1168838",
"url": "https://bugzilla.suse.com/1168838"
},
{
"category": "self",
"summary": "SUSE Bug 1169709",
"url": "https://bugzilla.suse.com/1169709"
},
{
"category": "self",
"summary": "SUSE Bug 1171295",
"url": "https://bugzilla.suse.com/1171295"
},
{
"category": "self",
"summary": "SUSE Bug 1173485",
"url": "https://bugzilla.suse.com/1173485"
},
{
"category": "self",
"summary": "SUSE Bug 1174416",
"url": "https://bugzilla.suse.com/1174416"
},
{
"category": "self",
"summary": "SUSE Bug 1174426",
"url": "https://bugzilla.suse.com/1174426"
},
{
"category": "self",
"summary": "SUSE Bug 1175995",
"url": "https://bugzilla.suse.com/1175995"
},
{
"category": "self",
"summary": "SUSE Bug 1176447",
"url": "https://bugzilla.suse.com/1176447"
},
{
"category": "self",
"summary": "SUSE Bug 1176774",
"url": "https://bugzilla.suse.com/1176774"
},
{
"category": "self",
"summary": "SUSE Bug 1177028",
"url": "https://bugzilla.suse.com/1177028"
},
{
"category": "self",
"summary": "SUSE Bug 1177326",
"url": "https://bugzilla.suse.com/1177326"
},
{
"category": "self",
"summary": "SUSE Bug 1177411",
"url": "https://bugzilla.suse.com/1177411"
},
{
"category": "self",
"summary": "SUSE Bug 1177437",
"url": "https://bugzilla.suse.com/1177437"
},
{
"category": "self",
"summary": "SUSE Bug 1177666",
"url": "https://bugzilla.suse.com/1177666"
},
{
"category": "self",
"summary": "SUSE Bug 1178089",
"url": "https://bugzilla.suse.com/1178089"
},
{
"category": "self",
"summary": "SUSE Bug 1178134",
"url": "https://bugzilla.suse.com/1178134"
},
{
"category": "self",
"summary": "SUSE Bug 1178163",
"url": "https://bugzilla.suse.com/1178163"
},
{
"category": "self",
"summary": "SUSE Bug 1178181",
"url": "https://bugzilla.suse.com/1178181"
},
{
"category": "self",
"summary": "SUSE Bug 1178330",
"url": "https://bugzilla.suse.com/1178330"
},
{
"category": "self",
"summary": "SUSE Bug 1178378",
"url": "https://bugzilla.suse.com/1178378"
},
{
"category": "self",
"summary": "SUSE Bug 1178418",
"url": "https://bugzilla.suse.com/1178418"
},
{
"category": "self",
"summary": "SUSE Bug 1178612",
"url": "https://bugzilla.suse.com/1178612"
},
{
"category": "self",
"summary": "SUSE Bug 1179243",
"url": "https://bugzilla.suse.com/1179243"
},
{
"category": "self",
"summary": "SUSE Bug 1179454",
"url": "https://bugzilla.suse.com/1179454"
},
{
"category": "self",
"summary": "SUSE Bug 1179458",
"url": "https://bugzilla.suse.com/1179458"
},
{
"category": "self",
"summary": "SUSE Bug 1179519",
"url": "https://bugzilla.suse.com/1179519"
},
{
"category": "self",
"summary": "SUSE Bug 1179825",
"url": "https://bugzilla.suse.com/1179825"
},
{
"category": "self",
"summary": "SUSE Bug 1179827",
"url": "https://bugzilla.suse.com/1179827"
},
{
"category": "self",
"summary": "SUSE Bug 1179851",
"url": "https://bugzilla.suse.com/1179851"
},
{
"category": "self",
"summary": "SUSE Bug 1180100",
"url": "https://bugzilla.suse.com/1180100"
},
{
"category": "self",
"summary": "SUSE Bug 1180197",
"url": "https://bugzilla.suse.com/1180197"
},
{
"category": "self",
"summary": "SUSE Bug 1180814",
"url": "https://bugzilla.suse.com/1180814"
},
{
"category": "self",
"summary": "SUSE Bug 1180846",
"url": "https://bugzilla.suse.com/1180846"
},
{
"category": "self",
"summary": "SUSE Bug 1180980",
"url": "https://bugzilla.suse.com/1180980"
},
{
"category": "self",
"summary": "SUSE Bug 1181104",
"url": "https://bugzilla.suse.com/1181104"
},
{
"category": "self",
"summary": "SUSE Bug 1181161",
"url": "https://bugzilla.suse.com/1181161"
},
{
"category": "self",
"summary": "SUSE Bug 1181383",
"url": "https://bugzilla.suse.com/1181383"
},
{
"category": "self",
"summary": "SUSE Bug 1181507",
"url": "https://bugzilla.suse.com/1181507"
},
{
"category": "self",
"summary": "SUSE Bug 1181674",
"url": "https://bugzilla.suse.com/1181674"
},
{
"category": "self",
"summary": "SUSE Bug 1181862",
"url": "https://bugzilla.suse.com/1181862"
},
{
"category": "self",
"summary": "SUSE Bug 1182077",
"url": "https://bugzilla.suse.com/1182077"
},
{
"category": "self",
"summary": "SUSE Bug 1182257",
"url": "https://bugzilla.suse.com/1182257"
},
{
"category": "self",
"summary": "SUSE Bug 1182377",
"url": "https://bugzilla.suse.com/1182377"
},
{
"category": "self",
"summary": "SUSE Bug 1182378",
"url": "https://bugzilla.suse.com/1182378"
},
{
"category": "self",
"summary": "SUSE Bug 1182552",
"url": "https://bugzilla.suse.com/1182552"
},
{
"category": "self",
"summary": "SUSE Bug 1182574",
"url": "https://bugzilla.suse.com/1182574"
},
{
"category": "self",
"summary": "SUSE Bug 1182591",
"url": "https://bugzilla.suse.com/1182591"
},
{
"category": "self",
"summary": "SUSE Bug 1182613",
"url": "https://bugzilla.suse.com/1182613"
},
{
"category": "self",
"summary": "SUSE Bug 1182712",
"url": "https://bugzilla.suse.com/1182712"
},
{
"category": "self",
"summary": "SUSE Bug 1182713",
"url": "https://bugzilla.suse.com/1182713"
},
{
"category": "self",
"summary": "SUSE Bug 1182715",
"url": "https://bugzilla.suse.com/1182715"
},
{
"category": "self",
"summary": "SUSE Bug 1182716",
"url": "https://bugzilla.suse.com/1182716"
},
{
"category": "self",
"summary": "SUSE Bug 1182717",
"url": "https://bugzilla.suse.com/1182717"
},
{
"category": "self",
"summary": "SUSE Bug 1182999",
"url": "https://bugzilla.suse.com/1182999"
},
{
"category": "self",
"summary": "SUSE Bug 1183022",
"url": "https://bugzilla.suse.com/1183022"
},
{
"category": "self",
"summary": "SUSE Bug 1183048",
"url": "https://bugzilla.suse.com/1183048"
},
{
"category": "self",
"summary": "SUSE Bug 1183069",
"url": "https://bugzilla.suse.com/1183069"
},
{
"category": "self",
"summary": "SUSE Bug 1183077",
"url": "https://bugzilla.suse.com/1183077"
},
{
"category": "self",
"summary": "SUSE Bug 1183095",
"url": "https://bugzilla.suse.com/1183095"
},
{
"category": "self",
"summary": "SUSE Bug 1183120",
"url": "https://bugzilla.suse.com/1183120"
},
{
"category": "self",
"summary": "SUSE Bug 1183203",
"url": "https://bugzilla.suse.com/1183203"
},
{
"category": "self",
"summary": "SUSE Bug 1183249",
"url": "https://bugzilla.suse.com/1183249"
},
{
"category": "self",
"summary": "SUSE Bug 1183252",
"url": "https://bugzilla.suse.com/1183252"
},
{
"category": "self",
"summary": "SUSE Bug 1183277",
"url": "https://bugzilla.suse.com/1183277"
},
{
"category": "self",
"summary": "SUSE Bug 1183278",
"url": "https://bugzilla.suse.com/1183278"
},
{
"category": "self",
"summary": "SUSE Bug 1183279",
"url": "https://bugzilla.suse.com/1183279"
},
{
"category": "self",
"summary": "SUSE Bug 1183280",
"url": "https://bugzilla.suse.com/1183280"
},
{
"category": "self",
"summary": "SUSE Bug 1183281",
"url": "https://bugzilla.suse.com/1183281"
},
{
"category": "self",
"summary": "SUSE Bug 1183282",
"url": "https://bugzilla.suse.com/1183282"
},
{
"category": "self",
"summary": "SUSE Bug 1183283",
"url": "https://bugzilla.suse.com/1183283"
},
{
"category": "self",
"summary": "SUSE Bug 1183284",
"url": "https://bugzilla.suse.com/1183284"
},
{
"category": "self",
"summary": "SUSE Bug 1183285",
"url": "https://bugzilla.suse.com/1183285"
},
{
"category": "self",
"summary": "SUSE Bug 1183286",
"url": "https://bugzilla.suse.com/1183286"
},
{
"category": "self",
"summary": "SUSE Bug 1183287",
"url": "https://bugzilla.suse.com/1183287"
},
{
"category": "self",
"summary": "SUSE Bug 1183288",
"url": "https://bugzilla.suse.com/1183288"
},
{
"category": "self",
"summary": "SUSE Bug 1183289",
"url": "https://bugzilla.suse.com/1183289"
},
{
"category": "self",
"summary": "SUSE Bug 1183310",
"url": "https://bugzilla.suse.com/1183310"
},
{
"category": "self",
"summary": "SUSE Bug 1183311",
"url": "https://bugzilla.suse.com/1183311"
},
{
"category": "self",
"summary": "SUSE Bug 1183312",
"url": "https://bugzilla.suse.com/1183312"
},
{
"category": "self",
"summary": "SUSE Bug 1183313",
"url": "https://bugzilla.suse.com/1183313"
},
{
"category": "self",
"summary": "SUSE Bug 1183314",
"url": "https://bugzilla.suse.com/1183314"
},
{
"category": "self",
"summary": "SUSE Bug 1183315",
"url": "https://bugzilla.suse.com/1183315"
},
{
"category": "self",
"summary": "SUSE Bug 1183316",
"url": "https://bugzilla.suse.com/1183316"
},
{
"category": "self",
"summary": "SUSE Bug 1183317",
"url": "https://bugzilla.suse.com/1183317"
},
{
"category": "self",
"summary": "SUSE Bug 1183318",
"url": "https://bugzilla.suse.com/1183318"
},
{
"category": "self",
"summary": "SUSE Bug 1183319",
"url": "https://bugzilla.suse.com/1183319"
},
{
"category": "self",
"summary": "SUSE Bug 1183320",
"url": "https://bugzilla.suse.com/1183320"
},
{
"category": "self",
"summary": "SUSE Bug 1183321",
"url": "https://bugzilla.suse.com/1183321"
},
{
"category": "self",
"summary": "SUSE Bug 1183322",
"url": "https://bugzilla.suse.com/1183322"
},
{
"category": "self",
"summary": "SUSE Bug 1183323",
"url": "https://bugzilla.suse.com/1183323"
},
{
"category": "self",
"summary": "SUSE Bug 1183324",
"url": "https://bugzilla.suse.com/1183324"
},
{
"category": "self",
"summary": "SUSE Bug 1183325",
"url": "https://bugzilla.suse.com/1183325"
},
{
"category": "self",
"summary": "SUSE Bug 1183326",
"url": "https://bugzilla.suse.com/1183326"
},
{
"category": "self",
"summary": "SUSE Bug 1183346",
"url": "https://bugzilla.suse.com/1183346"
},
{
"category": "self",
"summary": "SUSE Bug 1183366",
"url": "https://bugzilla.suse.com/1183366"
},
{
"category": "self",
"summary": "SUSE Bug 1183369",
"url": "https://bugzilla.suse.com/1183369"
},
{
"category": "self",
"summary": "SUSE Bug 1183386",
"url": "https://bugzilla.suse.com/1183386"
},
{
"category": "self",
"summary": "SUSE Bug 1183405",
"url": "https://bugzilla.suse.com/1183405"
},
{
"category": "self",
"summary": "SUSE Bug 1183412",
"url": "https://bugzilla.suse.com/1183412"
},
{
"category": "self",
"summary": "SUSE Bug 1183427",
"url": "https://bugzilla.suse.com/1183427"
},
{
"category": "self",
"summary": "SUSE Bug 1183428",
"url": "https://bugzilla.suse.com/1183428"
},
{
"category": "self",
"summary": "SUSE Bug 1183445",
"url": "https://bugzilla.suse.com/1183445"
},
{
"category": "self",
"summary": "SUSE Bug 1183447",
"url": "https://bugzilla.suse.com/1183447"
},
{
"category": "self",
"summary": "SUSE Bug 1183491",
"url": "https://bugzilla.suse.com/1183491"
},
{
"category": "self",
"summary": "SUSE Bug 1183501",
"url": "https://bugzilla.suse.com/1183501"
},
{
"category": "self",
"summary": "SUSE Bug 1183509",
"url": "https://bugzilla.suse.com/1183509"
},
{
"category": "self",
"summary": "SUSE Bug 1183530",
"url": "https://bugzilla.suse.com/1183530"
},
{
"category": "self",
"summary": "SUSE Bug 1183534",
"url": "https://bugzilla.suse.com/1183534"
},
{
"category": "self",
"summary": "SUSE Bug 1183540",
"url": "https://bugzilla.suse.com/1183540"
},
{
"category": "self",
"summary": "SUSE Bug 1183593",
"url": "https://bugzilla.suse.com/1183593"
},
{
"category": "self",
"summary": "SUSE Bug 1183596",
"url": "https://bugzilla.suse.com/1183596"
},
{
"category": "self",
"summary": "SUSE Bug 1183598",
"url": "https://bugzilla.suse.com/1183598"
},
{
"category": "self",
"summary": "SUSE Bug 1183637",
"url": "https://bugzilla.suse.com/1183637"
},
{
"category": "self",
"summary": "SUSE Bug 1183646",
"url": "https://bugzilla.suse.com/1183646"
},
{
"category": "self",
"summary": "SUSE Bug 1183658",
"url": "https://bugzilla.suse.com/1183658"
},
{
"category": "self",
"summary": "SUSE Bug 1183662",
"url": "https://bugzilla.suse.com/1183662"
},
{
"category": "self",
"summary": "SUSE Bug 1183686",
"url": "https://bugzilla.suse.com/1183686"
},
{
"category": "self",
"summary": "SUSE Bug 1183692",
"url": "https://bugzilla.suse.com/1183692"
},
{
"category": "self",
"summary": "SUSE Bug 1183696",
"url": "https://bugzilla.suse.com/1183696"
},
{
"category": "self",
"summary": "SUSE Bug 1183750",
"url": "https://bugzilla.suse.com/1183750"
},
{
"category": "self",
"summary": "SUSE Bug 1183757",
"url": "https://bugzilla.suse.com/1183757"
},
{
"category": "self",
"summary": "SUSE Bug 1183775",
"url": "https://bugzilla.suse.com/1183775"
},
{
"category": "self",
"summary": "SUSE Bug 1183815",
"url": "https://bugzilla.suse.com/1183815"
},
{
"category": "self",
"summary": "SUSE Bug 1183843",
"url": "https://bugzilla.suse.com/1183843"
},
{
"category": "self",
"summary": "SUSE Bug 1183859",
"url": "https://bugzilla.suse.com/1183859"
},
{
"category": "self",
"summary": "SUSE Bug 1183868",
"url": "https://bugzilla.suse.com/1183868"
},
{
"category": "self",
"summary": "SUSE Bug 1183871",
"url": "https://bugzilla.suse.com/1183871"
},
{
"category": "self",
"summary": "SUSE Bug 1183873",
"url": "https://bugzilla.suse.com/1183873"
},
{
"category": "self",
"summary": "SUSE Bug 1183932",
"url": "https://bugzilla.suse.com/1183932"
},
{
"category": "self",
"summary": "SUSE Bug 1183947",
"url": "https://bugzilla.suse.com/1183947"
},
{
"category": "self",
"summary": "SUSE Bug 1183976",
"url": "https://bugzilla.suse.com/1183976"
},
{
"category": "self",
"summary": "SUSE Bug 1184074",
"url": "https://bugzilla.suse.com/1184074"
},
{
"category": "self",
"summary": "SUSE Bug 1184081",
"url": "https://bugzilla.suse.com/1184081"
},
{
"category": "self",
"summary": "SUSE Bug 1184082",
"url": "https://bugzilla.suse.com/1184082"
},
{
"category": "self",
"summary": "SUSE Bug 1184120",
"url": "https://bugzilla.suse.com/1184120"
},
{
"category": "self",
"summary": "SUSE Bug 1184167",
"url": "https://bugzilla.suse.com/1184167"
},
{
"category": "self",
"summary": "SUSE Bug 1184168",
"url": "https://bugzilla.suse.com/1184168"
},
{
"category": "self",
"summary": "SUSE Bug 1184170",
"url": "https://bugzilla.suse.com/1184170"
},
{
"category": "self",
"summary": "SUSE Bug 1184171",
"url": "https://bugzilla.suse.com/1184171"
},
{
"category": "self",
"summary": "SUSE Bug 1184176",
"url": "https://bugzilla.suse.com/1184176"
},
{
"category": "self",
"summary": "SUSE Bug 1184192",
"url": "https://bugzilla.suse.com/1184192"
},
{
"category": "self",
"summary": "SUSE Bug 1184193",
"url": "https://bugzilla.suse.com/1184193"
},
{
"category": "self",
"summary": "SUSE Bug 1184194",
"url": "https://bugzilla.suse.com/1184194"
},
{
"category": "self",
"summary": "SUSE Bug 1184196",
"url": "https://bugzilla.suse.com/1184196"
},
{
"category": "self",
"summary": "SUSE Bug 1184197",
"url": "https://bugzilla.suse.com/1184197"
},
{
"category": "self",
"summary": "SUSE Bug 1184198",
"url": "https://bugzilla.suse.com/1184198"
},
{
"category": "self",
"summary": "SUSE Bug 1184199",
"url": "https://bugzilla.suse.com/1184199"
},
{
"category": "self",
"summary": "SUSE Bug 1184208",
"url": "https://bugzilla.suse.com/1184208"
},
{
"category": "self",
"summary": "SUSE Bug 1184209",
"url": "https://bugzilla.suse.com/1184209"
},
{
"category": "self",
"summary": "SUSE Bug 1184211",
"url": "https://bugzilla.suse.com/1184211"
},
{
"category": "self",
"summary": "SUSE Bug 1184217",
"url": "https://bugzilla.suse.com/1184217"
},
{
"category": "self",
"summary": "SUSE Bug 1184218",
"url": "https://bugzilla.suse.com/1184218"
},
{
"category": "self",
"summary": "SUSE Bug 1184219",
"url": "https://bugzilla.suse.com/1184219"
},
{
"category": "self",
"summary": "SUSE Bug 1184220",
"url": "https://bugzilla.suse.com/1184220"
},
{
"category": "self",
"summary": "SUSE Bug 1184224",
"url": "https://bugzilla.suse.com/1184224"
},
{
"category": "self",
"summary": "SUSE Bug 1184259",
"url": "https://bugzilla.suse.com/1184259"
},
{
"category": "self",
"summary": "SUSE Bug 1184264",
"url": "https://bugzilla.suse.com/1184264"
},
{
"category": "self",
"summary": "SUSE Bug 1184386",
"url": "https://bugzilla.suse.com/1184386"
},
{
"category": "self",
"summary": "SUSE Bug 1184388",
"url": "https://bugzilla.suse.com/1184388"
},
{
"category": "self",
"summary": "SUSE Bug 1184391",
"url": "https://bugzilla.suse.com/1184391"
},
{
"category": "self",
"summary": "SUSE Bug 1184393",
"url": "https://bugzilla.suse.com/1184393"
},
{
"category": "self",
"summary": "SUSE Bug 1184436",
"url": "https://bugzilla.suse.com/1184436"
},
{
"category": "self",
"summary": "SUSE Bug 1184485",
"url": "https://bugzilla.suse.com/1184485"
},
{
"category": "self",
"summary": "SUSE Bug 1184509",
"url": "https://bugzilla.suse.com/1184509"
},
{
"category": "self",
"summary": "SUSE Bug 1184511",
"url": "https://bugzilla.suse.com/1184511"
},
{
"category": "self",
"summary": "SUSE Bug 1184512",
"url": "https://bugzilla.suse.com/1184512"
},
{
"category": "self",
"summary": "SUSE Bug 1184514",
"url": "https://bugzilla.suse.com/1184514"
},
{
"category": "self",
"summary": "SUSE Bug 1184583",
"url": "https://bugzilla.suse.com/1184583"
},
{
"category": "self",
"summary": "SUSE Bug 1184585",
"url": "https://bugzilla.suse.com/1184585"
},
{
"category": "self",
"summary": "SUSE Bug 1184611",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "self",
"summary": "SUSE Bug 1184615",
"url": "https://bugzilla.suse.com/1184615"
},
{
"category": "self",
"summary": "SUSE Bug 1184650",
"url": "https://bugzilla.suse.com/1184650"
},
{
"category": "self",
"summary": "SUSE Bug 1184710",
"url": "https://bugzilla.suse.com/1184710"
},
{
"category": "self",
"summary": "SUSE Bug 1184724",
"url": "https://bugzilla.suse.com/1184724"
},
{
"category": "self",
"summary": "SUSE Bug 1184728",
"url": "https://bugzilla.suse.com/1184728"
},
{
"category": "self",
"summary": "SUSE Bug 1184730",
"url": "https://bugzilla.suse.com/1184730"
},
{
"category": "self",
"summary": "SUSE Bug 1184731",
"url": "https://bugzilla.suse.com/1184731"
},
{
"category": "self",
"summary": "SUSE Bug 1184736",
"url": "https://bugzilla.suse.com/1184736"
},
{
"category": "self",
"summary": "SUSE Bug 1184737",
"url": "https://bugzilla.suse.com/1184737"
},
{
"category": "self",
"summary": "SUSE Bug 1184738",
"url": "https://bugzilla.suse.com/1184738"
},
{
"category": "self",
"summary": "SUSE Bug 1184740",
"url": "https://bugzilla.suse.com/1184740"
},
{
"category": "self",
"summary": "SUSE Bug 1184741",
"url": "https://bugzilla.suse.com/1184741"
},
{
"category": "self",
"summary": "SUSE Bug 1184742",
"url": "https://bugzilla.suse.com/1184742"
},
{
"category": "self",
"summary": "SUSE Bug 1184760",
"url": "https://bugzilla.suse.com/1184760"
},
{
"category": "self",
"summary": "SUSE Bug 1184769",
"url": "https://bugzilla.suse.com/1184769"
},
{
"category": "self",
"summary": "SUSE Bug 1184811",
"url": "https://bugzilla.suse.com/1184811"
},
{
"category": "self",
"summary": "SUSE Bug 1184855",
"url": "https://bugzilla.suse.com/1184855"
},
{
"category": "self",
"summary": "SUSE Bug 1184893",
"url": "https://bugzilla.suse.com/1184893"
},
{
"category": "self",
"summary": "SUSE Bug 1184934",
"url": "https://bugzilla.suse.com/1184934"
},
{
"category": "self",
"summary": "SUSE Bug 1184942",
"url": "https://bugzilla.suse.com/1184942"
},
{
"category": "self",
"summary": "SUSE Bug 1184943",
"url": "https://bugzilla.suse.com/1184943"
},
{
"category": "self",
"summary": "SUSE Bug 1184952",
"url": "https://bugzilla.suse.com/1184952"
},
{
"category": "self",
"summary": "SUSE Bug 1184953",
"url": "https://bugzilla.suse.com/1184953"
},
{
"category": "self",
"summary": "SUSE Bug 1184955",
"url": "https://bugzilla.suse.com/1184955"
},
{
"category": "self",
"summary": "SUSE Bug 1184957",
"url": "https://bugzilla.suse.com/1184957"
},
{
"category": "self",
"summary": "SUSE Bug 1184969",
"url": "https://bugzilla.suse.com/1184969"
},
{
"category": "self",
"summary": "SUSE Bug 1184984",
"url": "https://bugzilla.suse.com/1184984"
},
{
"category": "self",
"summary": "SUSE Bug 1185010",
"url": "https://bugzilla.suse.com/1185010"
},
{
"category": "self",
"summary": "SUSE Bug 1185041",
"url": "https://bugzilla.suse.com/1185041"
},
{
"category": "self",
"summary": "SUSE Bug 1185110",
"url": "https://bugzilla.suse.com/1185110"
},
{
"category": "self",
"summary": "SUSE Bug 1185113",
"url": "https://bugzilla.suse.com/1185113"
},
{
"category": "self",
"summary": "SUSE Bug 1185233",
"url": "https://bugzilla.suse.com/1185233"
},
{
"category": "self",
"summary": "SUSE Bug 1185269",
"url": "https://bugzilla.suse.com/1185269"
},
{
"category": "self",
"summary": "SUSE Bug 1185365",
"url": "https://bugzilla.suse.com/1185365"
},
{
"category": "self",
"summary": "SUSE Bug 1185428",
"url": "https://bugzilla.suse.com/1185428"
},
{
"category": "self",
"summary": "SUSE Bug 1185454",
"url": "https://bugzilla.suse.com/1185454"
},
{
"category": "self",
"summary": "SUSE Bug 1185472",
"url": "https://bugzilla.suse.com/1185472"
},
{
"category": "self",
"summary": "SUSE Bug 1185491",
"url": "https://bugzilla.suse.com/1185491"
},
{
"category": "self",
"summary": "SUSE Bug 1185495",
"url": "https://bugzilla.suse.com/1185495"
},
{
"category": "self",
"summary": "SUSE Bug 1185497",
"url": "https://bugzilla.suse.com/1185497"
},
{
"category": "self",
"summary": "SUSE Bug 1185549",
"url": "https://bugzilla.suse.com/1185549"
},
{
"category": "self",
"summary": "SUSE Bug 1185550",
"url": "https://bugzilla.suse.com/1185550"
},
{
"category": "self",
"summary": "SUSE Bug 1185558",
"url": "https://bugzilla.suse.com/1185558"
},
{
"category": "self",
"summary": "SUSE Bug 1185573",
"url": "https://bugzilla.suse.com/1185573"
},
{
"category": "self",
"summary": "SUSE Bug 1185581",
"url": "https://bugzilla.suse.com/1185581"
},
{
"category": "self",
"summary": "SUSE Bug 1185586",
"url": "https://bugzilla.suse.com/1185586"
},
{
"category": "self",
"summary": "SUSE Bug 1185587",
"url": "https://bugzilla.suse.com/1185587"
},
{
"category": "self",
"summary": "SUSE Bug 1185589",
"url": "https://bugzilla.suse.com/1185589"
},
{
"category": "self",
"summary": "SUSE Bug 1185606",
"url": "https://bugzilla.suse.com/1185606"
},
{
"category": "self",
"summary": "SUSE Bug 1185640",
"url": "https://bugzilla.suse.com/1185640"
},
{
"category": "self",
"summary": "SUSE Bug 1185641",
"url": "https://bugzilla.suse.com/1185641"
},
{
"category": "self",
"summary": "SUSE Bug 1185642",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "self",
"summary": "SUSE Bug 1185645",
"url": "https://bugzilla.suse.com/1185645"
},
{
"category": "self",
"summary": "SUSE Bug 1185670",
"url": "https://bugzilla.suse.com/1185670"
},
{
"category": "self",
"summary": "SUSE Bug 1185677",
"url": "https://bugzilla.suse.com/1185677"
},
{
"category": "self",
"summary": "SUSE Bug 1185680",
"url": "https://bugzilla.suse.com/1185680"
},
{
"category": "self",
"summary": "SUSE Bug 1185703",
"url": "https://bugzilla.suse.com/1185703"
},
{
"category": "self",
"summary": "SUSE Bug 1185725",
"url": "https://bugzilla.suse.com/1185725"
},
{
"category": "self",
"summary": "SUSE Bug 1185736",
"url": "https://bugzilla.suse.com/1185736"
},
{
"category": "self",
"summary": "SUSE Bug 1185758",
"url": "https://bugzilla.suse.com/1185758"
},
{
"category": "self",
"summary": "SUSE Bug 1185796",
"url": "https://bugzilla.suse.com/1185796"
},
{
"category": "self",
"summary": "SUSE Bug 1185840",
"url": "https://bugzilla.suse.com/1185840"
},
{
"category": "self",
"summary": "SUSE Bug 1185857",
"url": "https://bugzilla.suse.com/1185857"
},
{
"category": "self",
"summary": "SUSE Bug 1185859",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "self",
"summary": "SUSE Bug 1185860",
"url": "https://bugzilla.suse.com/1185860"
},
{
"category": "self",
"summary": "SUSE Bug 1185861",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "self",
"summary": "SUSE Bug 1185862",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "self",
"summary": "SUSE Bug 1185863",
"url": "https://bugzilla.suse.com/1185863"
},
{
"category": "self",
"summary": "SUSE Bug 1185898",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "self",
"summary": "SUSE Bug 1185899",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "self",
"summary": "SUSE Bug 1185911",
"url": "https://bugzilla.suse.com/1185911"
},
{
"category": "self",
"summary": "SUSE Bug 1185938",
"url": "https://bugzilla.suse.com/1185938"
},
{
"category": "self",
"summary": "SUSE Bug 1185950",
"url": "https://bugzilla.suse.com/1185950"
},
{
"category": "self",
"summary": "SUSE Bug 1185954",
"url": "https://bugzilla.suse.com/1185954"
},
{
"category": "self",
"summary": "SUSE Bug 1185980",
"url": "https://bugzilla.suse.com/1185980"
},
{
"category": "self",
"summary": "SUSE Bug 1185982",
"url": "https://bugzilla.suse.com/1185982"
},
{
"category": "self",
"summary": "SUSE Bug 1185987",
"url": "https://bugzilla.suse.com/1185987"
},
{
"category": "self",
"summary": "SUSE Bug 1185988",
"url": "https://bugzilla.suse.com/1185988"
},
{
"category": "self",
"summary": "SUSE Bug 1186009",
"url": "https://bugzilla.suse.com/1186009"
},
{
"category": "self",
"summary": "SUSE Bug 1186060",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "self",
"summary": "SUSE Bug 1186061",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "self",
"summary": "SUSE Bug 1186062",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "self",
"summary": "SUSE Bug 1186111",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "self",
"summary": "SUSE Bug 1186118",
"url": "https://bugzilla.suse.com/1186118"
},
{
"category": "self",
"summary": "SUSE Bug 1186219",
"url": "https://bugzilla.suse.com/1186219"
},
{
"category": "self",
"summary": "SUSE Bug 1186285",
"url": "https://bugzilla.suse.com/1186285"
},
{
"category": "self",
"summary": "SUSE Bug 1186320",
"url": "https://bugzilla.suse.com/1186320"
},
{
"category": "self",
"summary": "SUSE Bug 1186349",
"url": "https://bugzilla.suse.com/1186349"
},
{
"category": "self",
"summary": "SUSE Bug 1186352",
"url": "https://bugzilla.suse.com/1186352"
},
{
"category": "self",
"summary": "SUSE Bug 1186353",
"url": "https://bugzilla.suse.com/1186353"
},
{
"category": "self",
"summary": "SUSE Bug 1186354",
"url": "https://bugzilla.suse.com/1186354"
},
{
"category": "self",
"summary": "SUSE Bug 1186355",
"url": "https://bugzilla.suse.com/1186355"
},
{
"category": "self",
"summary": "SUSE Bug 1186356",
"url": "https://bugzilla.suse.com/1186356"
},
{
"category": "self",
"summary": "SUSE Bug 1186357",
"url": "https://bugzilla.suse.com/1186357"
},
{
"category": "self",
"summary": "SUSE Bug 1186390",
"url": "https://bugzilla.suse.com/1186390"
},
{
"category": "self",
"summary": "SUSE Bug 1186401",
"url": "https://bugzilla.suse.com/1186401"
},
{
"category": "self",
"summary": "SUSE Bug 1186408",
"url": "https://bugzilla.suse.com/1186408"
},
{
"category": "self",
"summary": "SUSE Bug 1186416",
"url": "https://bugzilla.suse.com/1186416"
},
{
"category": "self",
"summary": "SUSE Bug 1186439",
"url": "https://bugzilla.suse.com/1186439"
},
{
"category": "self",
"summary": "SUSE Bug 1186441",
"url": "https://bugzilla.suse.com/1186441"
},
{
"category": "self",
"summary": "SUSE Bug 1186451",
"url": "https://bugzilla.suse.com/1186451"
},
{
"category": "self",
"summary": "SUSE Bug 1186460",
"url": "https://bugzilla.suse.com/1186460"
},
{
"category": "self",
"summary": "SUSE Bug 1186467",
"url": "https://bugzilla.suse.com/1186467"
},
{
"category": "self",
"summary": "SUSE Bug 1186479",
"url": "https://bugzilla.suse.com/1186479"
},
{
"category": "self",
"summary": "SUSE Bug 1186484",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "self",
"summary": "SUSE Bug 1186498",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "self",
"summary": "SUSE Bug 1186501",
"url": "https://bugzilla.suse.com/1186501"
},
{
"category": "self",
"summary": "SUSE Bug 1186512",
"url": "https://bugzilla.suse.com/1186512"
},
{
"category": "self",
"summary": "SUSE Bug 1186573",
"url": "https://bugzilla.suse.com/1186573"
},
{
"category": "self",
"summary": "SUSE Bug 1186681",
"url": "https://bugzilla.suse.com/1186681"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18814 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18814/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19769 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19769/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24586 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24587 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24587/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24588 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25670 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25670/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25671 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25671/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25672 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25672/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25673 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25673/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26139 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26141 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26145 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26145/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26147 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-27170 page",
"url": "https://www.suse.com/security/cve/CVE-2020-27170/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-27171 page",
"url": "https://www.suse.com/security/cve/CVE-2020-27171/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-27673 page",
"url": "https://www.suse.com/security/cve/CVE-2020-27673/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-27815 page",
"url": "https://www.suse.com/security/cve/CVE-2020-27815/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-35519 page",
"url": "https://www.suse.com/security/cve/CVE-2020-35519/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36310 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36310/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36311 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36311/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36312 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36312/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36322 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36322/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20268 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20268/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23134 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-27363 page",
"url": "https://www.suse.com/security/cve/CVE-2021-27363/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-27364 page",
"url": "https://www.suse.com/security/cve/CVE-2021-27364/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-27365 page",
"url": "https://www.suse.com/security/cve/CVE-2021-27365/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28038 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28038/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28375 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28375/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28660 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28660/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28688 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28688/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28950 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28950/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28952 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28952/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28964 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28964/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28971 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28971/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28972 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28972/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-29154 page",
"url": "https://www.suse.com/security/cve/CVE-2021-29154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-29155 page",
"url": "https://www.suse.com/security/cve/CVE-2021-29155/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-29264 page",
"url": "https://www.suse.com/security/cve/CVE-2021-29264/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-29265 page",
"url": "https://www.suse.com/security/cve/CVE-2021-29265/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-29647 page",
"url": "https://www.suse.com/security/cve/CVE-2021-29647/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-29650 page",
"url": "https://www.suse.com/security/cve/CVE-2021-29650/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30002 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30002/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32399 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33034 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33034/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33200 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3428 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3428/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3444 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3444/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3483 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3483/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3489 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3489/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3490 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3490/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3491 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3491/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-06-15T11:04:23Z",
"generator": {
"date": "2021-06-15T11:04:23Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:1975-1",
"initial_release_date": "2021-06-15T11:04:23Z",
"revision_history": [
{
"date": "2021-06-15T11:04:23Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-azure-5.3.18-38.3.1.noarch",
"product": {
"name": "kernel-devel-azure-5.3.18-38.3.1.noarch",
"product_id": "kernel-devel-azure-5.3.18-38.3.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-azure-5.3.18-38.3.1.noarch",
"product": {
"name": "kernel-source-azure-5.3.18-38.3.1.noarch",
"product_id": "kernel-source-azure-5.3.18-38.3.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"product": {
"name": "cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"product_id": "cluster-md-kmp-azure-5.3.18-38.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"product": {
"name": "dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"product_id": "dlm-kmp-azure-5.3.18-38.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"product": {
"name": "gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"product_id": "gfs2-kmp-azure-5.3.18-38.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-5.3.18-38.3.1.x86_64",
"product": {
"name": "kernel-azure-5.3.18-38.3.1.x86_64",
"product_id": "kernel-azure-5.3.18-38.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-5.3.18-38.3.1.x86_64",
"product": {
"name": "kernel-azure-devel-5.3.18-38.3.1.x86_64",
"product_id": "kernel-azure-devel-5.3.18-38.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-5.3.18-38.3.1.x86_64",
"product": {
"name": "kernel-azure-extra-5.3.18-38.3.1.x86_64",
"product_id": "kernel-azure-extra-5.3.18-38.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"product": {
"name": "kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"product_id": "kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-optional-5.3.18-38.3.1.x86_64",
"product": {
"name": "kernel-azure-optional-5.3.18-38.3.1.x86_64",
"product_id": "kernel-azure-optional-5.3.18-38.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-azure-5.3.18-38.3.1.x86_64",
"product": {
"name": "kernel-syms-azure-5.3.18-38.3.1.x86_64",
"product_id": "kernel-syms-azure-5.3.18-38.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"product": {
"name": "kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"product_id": "kselftests-kmp-azure-5.3.18-38.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"product": {
"name": "ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"product_id": "ocfs2-kmp-azure-5.3.18-38.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-azure-5.3.18-38.3.1.x86_64",
"product": {
"name": "reiserfs-kmp-azure-5.3.18-38.3.1.x86_64",
"product_id": "reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-5.3.18-38.3.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64"
},
"product_reference": "kernel-azure-5.3.18-38.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-5.3.18-38.3.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64"
},
"product_reference": "kernel-azure-devel-5.3.18-38.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-5.3.18-38.3.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch"
},
"product_reference": "kernel-devel-azure-5.3.18-38.3.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-5.3.18-38.3.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch"
},
"product_reference": "kernel-source-azure-5.3.18-38.3.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-5.3.18-38.3.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
},
"product_reference": "kernel-syms-azure-5.3.18-38.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-18814",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18814"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.3.9. There is a use-after-free when aa_label_parse() fails in aa_audit_rule_init() in security/apparmor/audit.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18814",
"url": "https://www.suse.com/security/cve/CVE-2019-18814"
},
{
"category": "external",
"summary": "SUSE Bug 1156256 for CVE-2019-18814",
"url": "https://bugzilla.suse.com/1156256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "moderate"
}
],
"title": "CVE-2019-18814"
},
{
"cve": "CVE-2019-19769",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19769"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel 5.3.10, there is a use-after-free (read) in the perf_trace_lock_acquire function (related to include/trace/events/lock.h).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19769",
"url": "https://www.suse.com/security/cve/CVE-2019-19769"
},
{
"category": "external",
"summary": "SUSE Bug 1159280 for CVE-2019-19769",
"url": "https://bugzilla.suse.com/1159280"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "moderate"
}
],
"title": "CVE-2019-19769"
},
{
"cve": "CVE-2020-24586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24586"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24586",
"url": "https://www.suse.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "moderate"
}
],
"title": "CVE-2020-24586"
},
{
"cve": "CVE-2020-24587",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24587"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24587",
"url": "https://www.suse.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1185862 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "moderate"
}
],
"title": "CVE-2020-24587"
},
{
"cve": "CVE-2020-24588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24588"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24588",
"url": "https://www.suse.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "SUSE Bug 1185861 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1192868"
},
{
"category": "external",
"summary": "SUSE Bug 1199701 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1199701"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "moderate"
}
],
"title": "CVE-2020-24588"
},
{
"cve": "CVE-2020-25670",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25670"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel where refcount leak in llcp_sock_bind() causing use-after-free which might lead to privilege escalations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25670",
"url": "https://www.suse.com/security/cve/CVE-2020-25670"
},
{
"category": "external",
"summary": "SUSE Bug 1178181 for CVE-2020-25670",
"url": "https://bugzilla.suse.com/1178181"
},
{
"category": "external",
"summary": "SUSE Bug 1194680 for CVE-2020-25670",
"url": "https://bugzilla.suse.com/1194680"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "important"
}
],
"title": "CVE-2020-25670"
},
{
"cve": "CVE-2020-25671",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25671"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel, where a refcount leak in llcp_sock_connect() causing use-after-free which might lead to privilege escalations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25671",
"url": "https://www.suse.com/security/cve/CVE-2020-25671"
},
{
"category": "external",
"summary": "SUSE Bug 1178181 for CVE-2020-25671",
"url": "https://bugzilla.suse.com/1178181"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "important"
}
],
"title": "CVE-2020-25671"
},
{
"cve": "CVE-2020-25672",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25672"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak vulnerability was found in Linux kernel in llcp_sock_connect",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25672",
"url": "https://www.suse.com/security/cve/CVE-2020-25672"
},
{
"category": "external",
"summary": "SUSE Bug 1178181 for CVE-2020-25672",
"url": "https://bugzilla.suse.com/1178181"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "important"
}
],
"title": "CVE-2020-25672"
},
{
"cve": "CVE-2020-25673",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25673"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux kernel where non-blocking socket in llcp_sock_connect() leads to leak and eventually hanging-up the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25673",
"url": "https://www.suse.com/security/cve/CVE-2020-25673"
},
{
"category": "external",
"summary": "SUSE Bug 1178181 for CVE-2020-25673",
"url": "https://bugzilla.suse.com/1178181"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "important"
}
],
"title": "CVE-2020-25673"
},
{
"cve": "CVE-2020-26139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26139"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26139",
"url": "https://www.suse.com/security/cve/CVE-2020-26139"
},
{
"category": "external",
"summary": "SUSE Bug 1186062 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "moderate"
}
],
"title": "CVE-2020-26139"
},
{
"cve": "CVE-2020-26141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26141"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26141",
"url": "https://www.suse.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "SUSE Bug 1185987 for CVE-2020-26141",
"url": "https://bugzilla.suse.com/1185987"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "moderate"
}
],
"title": "CVE-2020-26141"
},
{
"cve": "CVE-2020-26145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26145"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26145",
"url": "https://www.suse.com/security/cve/CVE-2020-26145"
},
{
"category": "external",
"summary": "SUSE Bug 1185860 for CVE-2020-26145",
"url": "https://bugzilla.suse.com/1185860"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "moderate"
}
],
"title": "CVE-2020-26145"
},
{
"cve": "CVE-2020-26147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26147"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26147",
"url": "https://www.suse.com/security/cve/CVE-2020-26147"
},
{
"category": "external",
"summary": "SUSE Bug 1233723 for CVE-2020-26147",
"url": "https://bugzilla.suse.com/1233723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "moderate"
}
],
"title": "CVE-2020-26147"
},
{
"cve": "CVE-2020-27170",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-27170"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.11.8. kernel/bpf/verifier.c performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory, aka CID-f232326f6966. This affects pointer types that do not define a ptr_limit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-27170",
"url": "https://www.suse.com/security/cve/CVE-2020-27170"
},
{
"category": "external",
"summary": "SUSE Bug 1183686 for CVE-2020-27170",
"url": "https://bugzilla.suse.com/1183686"
},
{
"category": "external",
"summary": "SUSE Bug 1183775 for CVE-2020-27170",
"url": "https://bugzilla.suse.com/1183775"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "moderate"
}
],
"title": "CVE-2020-27170"
},
{
"cve": "CVE-2020-27171",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-27171"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.11.8. kernel/bpf/verifier.c has an off-by-one error (with a resultant integer underflow) affecting out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory, aka CID-10d2bb2e6b1d.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-27171",
"url": "https://www.suse.com/security/cve/CVE-2020-27171"
},
{
"category": "external",
"summary": "SUSE Bug 1183686 for CVE-2020-27171",
"url": "https://bugzilla.suse.com/1183686"
},
{
"category": "external",
"summary": "SUSE Bug 1183775 for CVE-2020-27171",
"url": "https://bugzilla.suse.com/1183775"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "moderate"
}
],
"title": "CVE-2020-27171"
},
{
"cve": "CVE-2020-27673",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-27673"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. Guest OS users can cause a denial of service (host OS hang) via a high rate of events to dom0, aka CID-e99502f76271.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-27673",
"url": "https://www.suse.com/security/cve/CVE-2020-27673"
},
{
"category": "external",
"summary": "SUSE Bug 1177411 for CVE-2020-27673",
"url": "https://bugzilla.suse.com/1177411"
},
{
"category": "external",
"summary": "SUSE Bug 1184583 for CVE-2020-27673",
"url": "https://bugzilla.suse.com/1184583"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "moderate"
}
],
"title": "CVE-2020-27673"
},
{
"cve": "CVE-2020-27815",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-27815"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the JFS filesystem code in the Linux Kernel which allows a local attacker with the ability to set extended attributes to panic the system, causing memory corruption or escalating privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-27815",
"url": "https://www.suse.com/security/cve/CVE-2020-27815"
},
{
"category": "external",
"summary": "SUSE Bug 1179454 for CVE-2020-27815",
"url": "https://bugzilla.suse.com/1179454"
},
{
"category": "external",
"summary": "SUSE Bug 1179458 for CVE-2020-27815",
"url": "https://bugzilla.suse.com/1179458"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "important"
}
],
"title": "CVE-2020-27815"
},
{
"cve": "CVE-2020-35519",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-35519"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds (OOB) memory access flaw was found in x25_bind in net/x25/af_x25.c in the Linux kernel version v5.12-rc5. A bounds check failure allows a local attacker with a user account on the system to gain access to out-of-bounds memory, leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-35519",
"url": "https://www.suse.com/security/cve/CVE-2020-35519"
},
{
"category": "external",
"summary": "SUSE Bug 1183696 for CVE-2020-35519",
"url": "https://bugzilla.suse.com/1183696"
},
{
"category": "external",
"summary": "SUSE Bug 1184953 for CVE-2020-35519",
"url": "https://bugzilla.suse.com/1184953"
},
{
"category": "external",
"summary": "SUSE Bug 1211495 for CVE-2020-35519",
"url": "https://bugzilla.suse.com/1211495"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "important"
}
],
"title": "CVE-2020-35519"
},
{
"cve": "CVE-2020-36310",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36310"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.8. arch/x86/kvm/svm/svm.c allows a set_memory_region_test infinite loop for certain nested page faults, aka CID-e72436bc3a52.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36310",
"url": "https://www.suse.com/security/cve/CVE-2020-36310"
},
{
"category": "external",
"summary": "SUSE Bug 1184512 for CVE-2020-36310",
"url": "https://bugzilla.suse.com/1184512"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "moderate"
}
],
"title": "CVE-2020-36310"
},
{
"cve": "CVE-2020-36311",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36311"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.9. arch/x86/kvm/svm/sev.c allows attackers to cause a denial of service (soft lockup) by triggering destruction of a large SEV VM (which requires unregistering many encrypted regions), aka CID-7be74942f184.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36311",
"url": "https://www.suse.com/security/cve/CVE-2020-36311"
},
{
"category": "external",
"summary": "SUSE Bug 1184511 for CVE-2020-36311",
"url": "https://bugzilla.suse.com/1184511"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "low"
}
],
"title": "CVE-2020-36311"
},
{
"cve": "CVE-2020-36312",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36312"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.8.10. virt/kvm/kvm_main.c has a kvm_io_bus_unregister_dev memory leak upon a kmalloc failure, aka CID-f65886606c2d.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36312",
"url": "https://www.suse.com/security/cve/CVE-2020-36312"
},
{
"category": "external",
"summary": "SUSE Bug 1184509 for CVE-2020-36312",
"url": "https://bugzilla.suse.com/1184509"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "low"
}
],
"title": "CVE-2020-36312"
},
{
"cve": "CVE-2020-36322",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36322"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the FUSE filesystem implementation in the Linux kernel before 5.10.6, aka CID-5d069dbe8aaf. fuse_do_getattr() calls make_bad_inode() in inappropriate situations, causing a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36322",
"url": "https://www.suse.com/security/cve/CVE-2020-36322"
},
{
"category": "external",
"summary": "SUSE Bug 1184211 for CVE-2020-36322",
"url": "https://bugzilla.suse.com/1184211"
},
{
"category": "external",
"summary": "SUSE Bug 1184952 for CVE-2020-36322",
"url": "https://bugzilla.suse.com/1184952"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-36322",
"url": "https://bugzilla.suse.com/1189302"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "important"
}
],
"title": "CVE-2020-36322"
},
{
"cve": "CVE-2021-20268",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20268"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds access flaw was found in the Linux kernel\u0027s implementation of the eBPF code verifier in the way a user running the eBPF script calls dev_map_init_map or sock_map_alloc. This flaw allows a local user to crash the system or possibly escalate their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20268",
"url": "https://www.suse.com/security/cve/CVE-2021-20268"
},
{
"category": "external",
"summary": "SUSE Bug 1183077 for CVE-2021-20268",
"url": "https://bugzilla.suse.com/1183077"
},
{
"category": "external",
"summary": "SUSE Bug 1183095 for CVE-2021-20268",
"url": "https://bugzilla.suse.com/1183095"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "important"
}
],
"title": "CVE-2021-20268"
},
{
"cve": "CVE-2021-23134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23134"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23134",
"url": "https://www.suse.com/security/cve/CVE-2021-23134"
},
{
"category": "external",
"summary": "SUSE Bug 1186060 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "external",
"summary": "SUSE Bug 1186061 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "external",
"summary": "SUSE Bug 1220739 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1220739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "important"
}
],
"title": "CVE-2021-23134"
},
{
"cve": "CVE-2021-27363",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-27363"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.3. A kernel pointer leak can be used to determine the address of the iscsi_transport structure. When an iSCSI transport is registered with the iSCSI subsystem, the transport\u0027s handle is available to unprivileged users via the sysfs file system, at /sys/class/iscsi_transport/$TRANSPORT_NAME/handle. When read, the show_transport_handle function (in drivers/scsi/scsi_transport_iscsi.c) is called, which leaks the handle. This handle is actually the pointer to an iscsi_transport struct in the kernel module\u0027s global variables.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-27363",
"url": "https://www.suse.com/security/cve/CVE-2021-27363"
},
{
"category": "external",
"summary": "SUSE Bug 1182716 for CVE-2021-27363",
"url": "https://bugzilla.suse.com/1182716"
},
{
"category": "external",
"summary": "SUSE Bug 1182717 for CVE-2021-27363",
"url": "https://bugzilla.suse.com/1182717"
},
{
"category": "external",
"summary": "SUSE Bug 1183120 for CVE-2021-27363",
"url": "https://bugzilla.suse.com/1183120"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-27363",
"url": "https://bugzilla.suse.com/1200084"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "important"
}
],
"title": "CVE-2021-27363"
},
{
"cve": "CVE-2021-27364",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-27364"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.3. drivers/scsi/scsi_transport_iscsi.c is adversely affected by the ability of an unprivileged user to craft Netlink messages.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-27364",
"url": "https://www.suse.com/security/cve/CVE-2021-27364"
},
{
"category": "external",
"summary": "SUSE Bug 1182715 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1182715"
},
{
"category": "external",
"summary": "SUSE Bug 1182716 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1182716"
},
{
"category": "external",
"summary": "SUSE Bug 1182717 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1182717"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "important"
}
],
"title": "CVE-2021-27364"
},
{
"cve": "CVE-2021-27365",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-27365"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.3. Certain iSCSI data structures do not have appropriate length constraints or checks, and can exceed the PAGE_SIZE value. An unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-27365",
"url": "https://www.suse.com/security/cve/CVE-2021-27365"
},
{
"category": "external",
"summary": "SUSE Bug 1182712 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1182712"
},
{
"category": "external",
"summary": "SUSE Bug 1182715 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1182715"
},
{
"category": "external",
"summary": "SUSE Bug 1183491 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1183491"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "moderate"
}
],
"title": "CVE-2021-27365"
},
{
"cve": "CVE-2021-28038",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28038"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.3, as used with Xen PV. A certain part of the netback driver lacks necessary treatment of errors such as failed memory allocations (as a result of changes to the handling of grant mapping errors). A host OS denial of service may occur during misbehavior of a networking frontend driver. NOTE: this issue exists because of an incomplete fix for CVE-2021-26931.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28038",
"url": "https://www.suse.com/security/cve/CVE-2021-28038"
},
{
"category": "external",
"summary": "SUSE Bug 1183022 for CVE-2021-28038",
"url": "https://bugzilla.suse.com/1183022"
},
{
"category": "external",
"summary": "SUSE Bug 1183069 for CVE-2021-28038",
"url": "https://bugzilla.suse.com/1183069"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "moderate"
}
],
"title": "CVE-2021-28038"
},
{
"cve": "CVE-2021-28375",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28375"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.6. fastrpc_internal_invoke in drivers/misc/fastrpc.c does not prevent user applications from sending kernel RPC messages, aka CID-20c40794eb85. This is a related issue to CVE-2019-2308.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28375",
"url": "https://www.suse.com/security/cve/CVE-2021-28375"
},
{
"category": "external",
"summary": "SUSE Bug 1183596 for CVE-2021-28375",
"url": "https://bugzilla.suse.com/1183596"
},
{
"category": "external",
"summary": "SUSE Bug 1184955 for CVE-2021-28375",
"url": "https://bugzilla.suse.com/1184955"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "important"
}
],
"title": "CVE-2021-28375"
},
{
"cve": "CVE-2021-28660",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28660"
}
],
"notes": [
{
"category": "general",
"text": "rtw_wx_set_scan in drivers/staging/rtl8188eu/os_dep/ioctl_linux.c in the Linux kernel through 5.11.6 allows writing beyond the end of the -\u003essid[] array. NOTE: from the perspective of kernel.org releases, CVE IDs are not normally used for drivers/staging/* (unfinished work); however, system integrators may have situations in which a drivers/staging issue is relevant to their own customer base.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28660",
"url": "https://www.suse.com/security/cve/CVE-2021-28660"
},
{
"category": "external",
"summary": "SUSE Bug 1183593 for CVE-2021-28660",
"url": "https://bugzilla.suse.com/1183593"
},
{
"category": "external",
"summary": "SUSE Bug 1183658 for CVE-2021-28660",
"url": "https://bugzilla.suse.com/1183658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "important"
}
],
"title": "CVE-2021-28660"
},
{
"cve": "CVE-2021-28688",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28688"
}
],
"notes": [
{
"category": "general",
"text": "The fix for XSA-365 includes initialization of pointers such that subsequent cleanup code wouldn\u0027t use uninitialized or stale values. This initialization went too far and may under certain conditions also overwrite pointers which are in need of cleaning up. The lack of cleanup would result in leaking persistent grants. The leak in turn would prevent fully cleaning up after a respective guest has died, leaving around zombie domains. All Linux versions having the fix for XSA-365 applied are vulnerable. XSA-365 was classified to affect versions back to at least 3.11.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28688",
"url": "https://www.suse.com/security/cve/CVE-2021-28688"
},
{
"category": "external",
"summary": "SUSE Bug 1183646 for CVE-2021-28688",
"url": "https://bugzilla.suse.com/1183646"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "moderate"
}
],
"title": "CVE-2021-28688"
},
{
"cve": "CVE-2021-28950",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28950"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in fs/fuse/fuse_i.h in the Linux kernel before 5.11.8. A \"stall on CPU\" can occur because a retry loop continually finds the same bad inode, aka CID-775c5033a0d1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28950",
"url": "https://www.suse.com/security/cve/CVE-2021-28950"
},
{
"category": "external",
"summary": "SUSE Bug 1184194 for CVE-2021-28950",
"url": "https://bugzilla.suse.com/1184194"
},
{
"category": "external",
"summary": "SUSE Bug 1184211 for CVE-2021-28950",
"url": "https://bugzilla.suse.com/1184211"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "moderate"
}
],
"title": "CVE-2021-28950"
},
{
"cve": "CVE-2021-28952",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28952"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.8. The sound/soc/qcom/sdm845.c soundwire device driver has a buffer overflow when an unexpected port ID number is encountered, aka CID-1c668e1c0a0f. (This has been fixed in 5.12-rc4.)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28952",
"url": "https://www.suse.com/security/cve/CVE-2021-28952"
},
{
"category": "external",
"summary": "SUSE Bug 1184197 for CVE-2021-28952",
"url": "https://bugzilla.suse.com/1184197"
},
{
"category": "external",
"summary": "SUSE Bug 1184199 for CVE-2021-28952",
"url": "https://bugzilla.suse.com/1184199"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "important"
}
],
"title": "CVE-2021-28952"
},
{
"cve": "CVE-2021-28964",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28964"
}
],
"notes": [
{
"category": "general",
"text": "A race condition was discovered in get_old_root in fs/btrfs/ctree.c in the Linux kernel through 5.11.8. It allows attackers to cause a denial of service (BUG) because of a lack of locking on an extent buffer before a cloning operation, aka CID-dbcc7d57bffc.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28964",
"url": "https://www.suse.com/security/cve/CVE-2021-28964"
},
{
"category": "external",
"summary": "SUSE Bug 1184193 for CVE-2021-28964",
"url": "https://bugzilla.suse.com/1184193"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "moderate"
}
],
"title": "CVE-2021-28964"
},
{
"cve": "CVE-2021-28971",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28971"
}
],
"notes": [
{
"category": "general",
"text": "In intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c in the Linux kernel through 5.11.8 on some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled, aka CID-d88d05a9e0b6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28971",
"url": "https://www.suse.com/security/cve/CVE-2021-28971"
},
{
"category": "external",
"summary": "SUSE Bug 1184196 for CVE-2021-28971",
"url": "https://bugzilla.suse.com/1184196"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "moderate"
}
],
"title": "CVE-2021-28971"
},
{
"cve": "CVE-2021-28972",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28972"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/pci/hotplug/rpadlpar_sysfs.c in the Linux kernel through 5.11.8, the RPA PCI Hotplug driver has a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly. This occurs because add_slot_store and remove_slot_store mishandle drc_name \u0027\\0\u0027 termination, aka CID-cc7a0bb058b8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28972",
"url": "https://www.suse.com/security/cve/CVE-2021-28972"
},
{
"category": "external",
"summary": "SUSE Bug 1184198 for CVE-2021-28972",
"url": "https://bugzilla.suse.com/1184198"
},
{
"category": "external",
"summary": "SUSE Bug 1220060 for CVE-2021-28972",
"url": "https://bugzilla.suse.com/1220060"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "moderate"
}
],
"title": "CVE-2021-28972"
},
{
"cve": "CVE-2021-29154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-29154"
}
],
"notes": [
{
"category": "general",
"text": "BPF JIT compilers in the Linux kernel through 5.11.12 have incorrect computation of branch displacements, allowing them to execute arbitrary code within the kernel context. This affects arch/x86/net/bpf_jit_comp.c and arch/x86/net/bpf_jit_comp32.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-29154",
"url": "https://www.suse.com/security/cve/CVE-2021-29154"
},
{
"category": "external",
"summary": "SUSE Bug 1184391 for CVE-2021-29154",
"url": "https://bugzilla.suse.com/1184391"
},
{
"category": "external",
"summary": "SUSE Bug 1184710 for CVE-2021-29154",
"url": "https://bugzilla.suse.com/1184710"
},
{
"category": "external",
"summary": "SUSE Bug 1186408 for CVE-2021-29154",
"url": "https://bugzilla.suse.com/1186408"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "moderate"
}
],
"title": "CVE-2021-29154"
},
{
"cve": "CVE-2021-29155",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-29155"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.x. kernel/bpf/verifier.c performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory. Specifically, for sequences of pointer arithmetic operations, the pointer modification performed by the first operation is not correctly accounted for when restricting subsequent operations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-29155",
"url": "https://www.suse.com/security/cve/CVE-2021-29155"
},
{
"category": "external",
"summary": "SUSE Bug 1184942 for CVE-2021-29155",
"url": "https://bugzilla.suse.com/1184942"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "moderate"
}
],
"title": "CVE-2021-29155"
},
{
"cve": "CVE-2021-29264",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-29264"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.10. drivers/net/ethernet/freescale/gianfar.c in the Freescale Gianfar Ethernet driver allows attackers to cause a system crash because a negative fragment size is calculated in situations involving an rx queue overrun when jumbo packets are used and NAPI is enabled, aka CID-d8861bab48b6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-29264",
"url": "https://www.suse.com/security/cve/CVE-2021-29264"
},
{
"category": "external",
"summary": "SUSE Bug 1184168 for CVE-2021-29264",
"url": "https://bugzilla.suse.com/1184168"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "moderate"
}
],
"title": "CVE-2021-29264"
},
{
"cve": "CVE-2021-29265",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-29265"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.11.7. usbip_sockfd_store in drivers/usb/usbip/stub_dev.c allows attackers to cause a denial of service (GPF) because the stub-up sequence has race conditions during an update of the local and shared status, aka CID-9380afd6df70.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-29265",
"url": "https://www.suse.com/security/cve/CVE-2021-29265"
},
{
"category": "external",
"summary": "SUSE Bug 1184167 for CVE-2021-29265",
"url": "https://bugzilla.suse.com/1184167"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "moderate"
}
],
"title": "CVE-2021-29265"
},
{
"cve": "CVE-2021-29647",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-29647"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.11.11. qrtr_recvmsg in net/qrtr/qrtr.c allows attackers to obtain sensitive information from kernel memory because of a partially uninitialized data structure, aka CID-50535249f624.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-29647",
"url": "https://www.suse.com/security/cve/CVE-2021-29647"
},
{
"category": "external",
"summary": "SUSE Bug 1184192 for CVE-2021-29647",
"url": "https://bugzilla.suse.com/1184192"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "moderate"
}
],
"title": "CVE-2021-29647"
},
{
"cve": "CVE-2021-29650",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-29650"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.11.11. The netfilter subsystem allows attackers to cause a denial of service (panic) because net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h lack a full memory barrier upon the assignment of a new table value, aka CID-175e476b8cdf.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-29650",
"url": "https://www.suse.com/security/cve/CVE-2021-29650"
},
{
"category": "external",
"summary": "SUSE Bug 1184208 for CVE-2021-29650",
"url": "https://bugzilla.suse.com/1184208"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "moderate"
}
],
"title": "CVE-2021-29650"
},
{
"cve": "CVE-2021-30002",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30002"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.11.3 when a webcam device exists. video_usercopy in drivers/media/v4l2-core/v4l2-ioctl.c has a memory leak for large arguments, aka CID-fb18802a338b.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30002",
"url": "https://www.suse.com/security/cve/CVE-2021-30002"
},
{
"category": "external",
"summary": "SUSE Bug 1184120 for CVE-2021-30002",
"url": "https://bugzilla.suse.com/1184120"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "moderate"
}
],
"title": "CVE-2021-30002"
},
{
"cve": "CVE-2021-32399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32399"
}
],
"notes": [
{
"category": "general",
"text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32399",
"url": "https://www.suse.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "SUSE Bug 1184611 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "external",
"summary": "SUSE Bug 1185898 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "external",
"summary": "SUSE Bug 1185899 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "important"
}
],
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-33034",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33034"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33034",
"url": "https://www.suse.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "SUSE Bug 1186111 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "external",
"summary": "SUSE Bug 1186285 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "important"
}
],
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-33200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33200"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-\u003ealu_limit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33200",
"url": "https://www.suse.com/security/cve/CVE-2021-33200"
},
{
"category": "external",
"summary": "SUSE Bug 1186484 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "external",
"summary": "SUSE Bug 1186498 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "important"
}
],
"title": "CVE-2021-33200"
},
{
"cve": "CVE-2021-3428",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3428"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel. A denial of service problem is identified if an extent tree is corrupted in a crafted ext4 filesystem in fs/ext4/extents.c in ext4_es_cache_extent. Fabricating an integer overflow, A local attacker with a special user privilege may cause a system crash problem which can lead to an availability threat.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3428",
"url": "https://www.suse.com/security/cve/CVE-2021-3428"
},
{
"category": "external",
"summary": "SUSE Bug 1173485 for CVE-2021-3428",
"url": "https://bugzilla.suse.com/1173485"
},
{
"category": "external",
"summary": "SUSE Bug 1183509 for CVE-2021-3428",
"url": "https://bugzilla.suse.com/1183509"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "low"
}
],
"title": "CVE-2021-3428"
},
{
"cve": "CVE-2021-3444",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3444"
}
],
"notes": [
{
"category": "general",
"text": "The bpf verifier in the Linux kernel did not properly handle mod32 destination register truncation when the source register was known to be 0. A local attacker with the ability to load bpf programs could use this gain out-of-bounds reads in kernel memory leading to information disclosure (kernel memory), and possibly out-of-bounds writes that could potentially lead to code execution. This issue was addressed in the upstream kernel in commit 9b00f1b78809 (\"bpf: Fix truncation handling for mod32 dst reg wrt zero\") and in Linux stable kernels 5.11.2, 5.10.19, and 5.4.101.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3444",
"url": "https://www.suse.com/security/cve/CVE-2021-3444"
},
{
"category": "external",
"summary": "SUSE Bug 1184170 for CVE-2021-3444",
"url": "https://bugzilla.suse.com/1184170"
},
{
"category": "external",
"summary": "SUSE Bug 1184171 for CVE-2021-3444",
"url": "https://bugzilla.suse.com/1184171"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "moderate"
}
],
"title": "CVE-2021-3444"
},
{
"cve": "CVE-2021-3483",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3483"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Nosy driver in the Linux kernel. This issue allows a device to be inserted twice into a doubly-linked list, leading to a use-after-free when one of these devices is removed. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. Versions before kernel 5.12-rc6 are affected",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3483",
"url": "https://www.suse.com/security/cve/CVE-2021-3483"
},
{
"category": "external",
"summary": "SUSE Bug 1184393 for CVE-2021-3483",
"url": "https://bugzilla.suse.com/1184393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "moderate"
}
],
"title": "CVE-2021-3483"
},
{
"cve": "CVE-2021-3489",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3489"
}
],
"notes": [
{
"category": "general",
"text": "The eBPF RINGBUF bpf_ringbuf_reserve() function in the Linux kernel did not check that the allocated size was smaller than the ringbuf size, allowing an attacker to perform out-of-bounds writes within the kernel and therefore, arbitrary code execution. This issue was fixed via commit 4b81ccebaeee (\"bpf, ringbuf: Deny reserve of buffers larger than ringbuf\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced via 457f44363a88 (\"bpf: Implement BPF ring buffer and verifier support for it\") (v5.8-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3489",
"url": "https://www.suse.com/security/cve/CVE-2021-3489"
},
{
"category": "external",
"summary": "SUSE Bug 1185640 for CVE-2021-3489",
"url": "https://bugzilla.suse.com/1185640"
},
{
"category": "external",
"summary": "SUSE Bug 1185856 for CVE-2021-3489",
"url": "https://bugzilla.suse.com/1185856"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "important"
}
],
"title": "CVE-2021-3489"
},
{
"cve": "CVE-2021-3490",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3490"
}
],
"notes": [
{
"category": "general",
"text": "The eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) in the Linux kernel did not properly update 32-bit bounds, which could be turned into out of bounds reads and writes in the Linux kernel and therefore, arbitrary code execution. This issue was fixed via commit 049c4e13714e (\"bpf: Fix alu32 const subreg bound tracking on bitwise operations\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. The AND/OR issues were introduced by commit 3f50f132d840 (\"bpf: Verifier, do explicit ALU32 bounds tracking\") (5.7-rc1) and the XOR variant was introduced by 2921c90d4718 (\"bpf:Fix a verifier failure with xor\") ( 5.10-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3490",
"url": "https://www.suse.com/security/cve/CVE-2021-3490"
},
{
"category": "external",
"summary": "SUSE Bug 1185641 for CVE-2021-3490",
"url": "https://bugzilla.suse.com/1185641"
},
{
"category": "external",
"summary": "SUSE Bug 1185796 for CVE-2021-3490",
"url": "https://bugzilla.suse.com/1185796"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "important"
}
],
"title": "CVE-2021-3490"
},
{
"cve": "CVE-2021-3491",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3491"
}
],
"notes": [
{
"category": "general",
"text": "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3491",
"url": "https://www.suse.com/security/cve/CVE-2021-3491"
},
{
"category": "external",
"summary": "SUSE Bug 1185642 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "external",
"summary": "SUSE Bug 1187090 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1187090"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "important"
}
],
"title": "CVE-2021-3491"
}
]
}
suse-su-2021:1887-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-33200: Enforcing incorrect limits for pointer arithmetic operations by the BPF verifier could be abused to perform out-of-bounds reads and writes in kernel memory (bsc#1186484).\n- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values. (bsc#1186111)\n- CVE-2020-26139: Fixed a denial-of-service when an Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. (bnc#1186062)\n- CVE-2021-23134: A Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges. (bnc#1186060)\n- CVE-2021-3491: Fixed a potential heap overflow in mem_rw(). This vulnerability is related to the PROVIDE_BUFFERS operation, which allowed the MAX_RW_COUNT limit to be bypassed (bsc#1185642).\n- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).\n- CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances this can be abused to inject arbitrary network packets and/or exfiltrate user data (bnc#1185859).\n- CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed (bnc#1185859 bnc#1185862).\n- CVE-2020-26147: The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments, even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used (bnc#1185859).\n- CVE-2020-26145: An issue was discovered with Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration. (bnc#1185860)\n- CVE-2020-26141: An issue was discovered in the ALFA driver for AWUS036H, where the Message Integrity Check (authenticity) of fragmented TKIP frames was not verified. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bnc#1185987)\n- CVE-2021-23133: Fixed a race condition in SCTP sockets, which could lead to privilege escalation from the context of a network service or an unprivileged process. (bnc#1184675)\n\nThe following non-security bugs were fixed:\n\n- ACPI / hotplug / PCI: Fix reference count leak in enable_slot() (git-fixes).\n- ACPI: CPPC: Replace cppc_attr with kobj_attribute (git-fixes).\n- ACPI: GTDT: Do not corrupt interrupt mappings on watchdow probe failure (git-fixes).\n- ACPI: custom_method: fix a possible memory leak (git-fixes).\n- ACPI: custom_method: fix potential use-after-free issue (git-fixes).\n- ACPICA: Enable sleep button on ACPI legacy wake (bsc#1181383).\n- ALSA: aloop: Fix initialization of controls (git-fixes).\n- ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro (git-fixes).\n- ALSA: core: remove redundant spin_lock pair in snd_card_disconnect (git-fixes).\n- ALSA: emu8000: Fix a use after free in snd_emu8000_create_mixer (git-fixes).\n- ALSA: hda/conexant: Re-order CX5066 quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC269 Lenovo quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC269 Sony quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC882 Acer quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC882 Sony quirk table entries (git-fixes).\n- ALSA: hda/realtek: Remove redundant entry for ALC861 Haier/Uniwill devices (git-fixes).\n- ALSA: hda/realtek: reset eapd coeff to default value for alc287 (git-fixes).\n- ALSA: hdsp: do not disable if not enabled (git-fixes).\n- ALSA: hdspm: do not disable if not enabled (git-fixes).\n- ALSA: line6: Fix racy initialization of LINE6 MIDI (git-fixes).\n- ALSA: rme9652: do not disable if not enabled (git-fixes).\n- ALSA: sb: Fix two use after free in snd_sb_qsound_build (git-fixes).\n- ALSA: usb-audio: Add MIDI quirk for Vox ToneLab EX (git-fixes).\n- ALSA: usb-audio: Add error checks for usb_driver_claim_interface() calls (git-fixes).\n- ALSA: usb: midi: do not return -ENOMEM when usb_urb_ep_type_check fails (git-fixes).\n- ARM: footbridge: fix PCI interrupt mapping (git-fixes).\n- ASoC: cs35l33: fix an error code in probe() (git-fixes).\n- ASoC: cs42l42: Regmap must use_single_read/write (git-fixes).\n- ASoC: fsl_esai: Fix TDM slot setup for I2S mode (git-fixes).\n- ASoC: intel: atom: Stop advertising non working S24LE support (git-fixes).\n- ASoC: rt286: Generalize support for ALC3263 codec (git-fixes).\n- ASoC: rt286: Make RT286_SET_GPIO_* readable and writable (git-fixes).\n- ASoC: wm8960: Fix wrong bclk and lrclk with pll enabled for some chips (git-fixes).\n- Avoid potentially erroneos RST drop (bsc#1183947).\n- Bluetooth: SMP: Fail if remote and local public keys are identical (git-fixes).\n- Bluetooth: Set CONF_NOT_COMPLETE as l2cap_chan default (git-fixes).\n- Bluetooth: initialize skb_queue_head at l2cap_chan_create() (git-fixes).\n- Do not drop out of segments RST if tcp_be_liberal is set (bsc#1183947).\n- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185724).\n- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185724).\n- Drivers: hv: vmbus: Use after free in __vmbus_open() (git-fixes).\n- EDAC/amd64: Gather hardware information early (bsc#1180552).\n- EDAC/amd64: Make struct amd64_family_type global (bsc#1180552).\n- EDAC/amd64: Save max number of controllers to family type (bsc#1180552).\n- HID: alps: fix error return code in alps_input_configured() (git-fixes).\n- HID: plantronics: Workaround for double volume key presses (git-fixes).\n- HID: wacom: Assign boolean values to a bool variable (git-fixes).\n- HID: wacom: set EV_KEY and EV_ABS only for non-HID_GENERIC type of devices (git-fixes).\n- Input: elants_i2c - do not bind to i2c-hid compatible ACPI instantiated devices (git-fixes).\n- Input: i8042 - fix Pegatron C15B ID entry (git-fixes).\n- Input: nspire-keypad - enable interrupts only when opened (git-fixes).\n- Input: silead - add workaround for x86 BIOS-es which bring the chip up in a stuck state (git-fixes).\n- KVM: s390: fix guarded storage control register handling (bsc#1133021).\n- NFC: fix possible resource leak (git-fixes).\n- NFC: fix resource leak when target index is invalid (git-fixes).\n- NFC: nci: fix memory leak in nci_allocate_device (git-fixes).\n- NFSv4: Replace closed stateids with the \u0027invalid special stateid\u0027 (bsc#1185481).\n- PCI: PM: Do not read power state in pci_enable_device_flags() (git-fixes).\n- PCI: Release OF node in pci_scan_device()\u0027s error path (git-fixes).\n- RDMA/hns: Delete redundant condition judgment related to eq (bsc#1104427).\n- RDMA/srpt: Fix error return code in srpt_cm_req_recv() (bsc#1103992).\n- SUNRPC in case of backlog, hand free slots directly to waiting task (bsc#1185428).\n- SUNRPC: More fixes for backlog congestion (bsc#1185428).\n- USB: Add LPM quirk for Lenovo ThinkPad USB-C Dock Gen2 Ethernet (git-fixes).\n- USB: Add reset-resume quirk for WD19\u0027s Realtek Hub (git-fixes).\n- USB: serial: fix return value for unsupported ioctls (git-fixes).\n- USB: serial: usb_wwan: fix unprivileged TIOCCSERIAL (git-fixes).\n- USB: trancevibrator: fix control-request direction (git-fixes).\n- af_packet: fix the tx skb protocol in raw sockets with ETH_P_ALL (bsc#1176081).\n- ata: libahci_platform: fix IRQ check (git-fixes).\n- ath9k: Fix error check in ath9k_hw_read_revisions() for PCI devices (git-fixes).\n- backlight: journada720: Fix Wmisleading-indentation warning (git-fixes).\n- batman-adv: Do not always reallocate the fragmentation skb head (git-fixes).\n- bluetooth: eliminate the potential race condition when removing the HCI controller (git-fixes).\n- bnxt_en: Fix PCI AER error recovery flow (git-fixes).\n- bnxt_en: fix ternary sign extension bug in bnxt_show_temp() (bsc#1104745).\n- bpf: Fix masking negation logic upon negative dst register (git-fixes).\n- btrfs: fix race between transaction aborts and fsyncs leading to use-after-free (bsc#1186441).\n- btrfs: fix race when picking most recent mod log operation for an old root (bsc#1186439).\n- bus: qcom: Put child node before return (git-fixes).\n- cfg80211: remove WARN_ON() in cfg80211_sme_connect (git-fixes).\n- cfg80211: scan: drop entry from hidden_list on overflow (git-fixes).\n- clk: exynos7: Mark aclk_fsys1_200 as critical (git-fixes).\n- clk: fix invalid usage of list cursor in register (git-fixes).\n- clk: fix invalid usage of list cursor in unregister (git-fixes).\n- clk: mvebu: armada-37xx-periph: Fix switching CPU freq from 250 Mhz to 1 GHz (git-fixes).\n- clk: mvebu: armada-37xx-periph: Fix workaround for switching from L1 to L0 (git-fixes).\n- clk: mvebu: armada-37xx-periph: remove .set_parent method for CPU PM clock (git-fixes).\n- clk: socfpga: fix iomem pointer cast on 64-bit (git-fixes).\n- clk: uniphier: Fix potential infinite loop (git-fixes).\n- cpufreq: Add NULL checks to show() and store() methods of cpufreq (bsc#1184040).\n- cpufreq: Avoid cpufreq_suspend() deadlock on system shutdown (bsc#1184040).\n- cpufreq: Kconfig: fix documentation links (git-fixes).\n- cpufreq: intel_pstate: Add Icelake servers support in no-HWP mode (bsc#1185758).\n- crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init (git-fixes).\n- crypto: qat - Fix a double free in adf_create_ring (git-fixes).\n- crypto: qat - do not release uninitialized resources (git-fixes).\n- crypto: qat - fix error path in adf_isr_resource_alloc() (git-fixes).\n- cxgb4: Fix unintentional sign extension issues (bsc#1064802 bsc#1066129).\n- dm: fix redundant IO accounting for bios that need splitting (bsc#1183738).\n- dmaengine: dw: Make it dependent to HAS_IOMEM (git-fixes).\n- docs: kernel-parameters: Add gpio_mockup_named_lines (git-fixes).\n- docs: kernel-parameters: Move gpio-mockup for alphabetic order (git-fixes).\n- drivers: net: fix memory leak in atusb_probe (git-fixes).\n- drivers: net: fix memory leak in peak_usb_create_dev (git-fixes).\n- drm/amdgpu : Fix asic reset regression issue introduce by 8f211fe8ac7c4f (git-fixes).\n- drm/amdgpu: fix NULL pointer dereference (git-fixes).\n- drm/amdkfd: fix build error with AMD_IOMMU_V2=m (git-fixes).\n- drm/i915/gvt: Fix error code in intel_gvt_init_device() (git-fixes).\n- drm/imx: imx-ldb: fix out of bounds array access warning (git-fixes).\n- drm/meson: fix shutdown crash when component not probed (git-fixes).\n- drm/msm/mdp5: Configure PP_SYNC_HEIGHT to double the vtotal (git-fixes).\n- drm/omap: fix misleading indentation in pixinc() (git-fixes).\n- drm/radeon/dpm: Disable sclk switching on Oland when two 4K 60Hz monitors are connected (git-fixes).\n- drm/radeon: Fix off-by-one power_state index heap overwrite (git-fixes).\n- drm/radeon: fix copy of uninitialized variable back to userspace (git-fixes).\n- e1000e: Fix duplicate include guard (git-fixes).\n- e1000e: Fix error handling in e1000_set_d0_lplu_state_82571 (git-fixes).\n- e1000e: add rtnl_lock() to e1000_reset_task (git-fixes).\n- ethernet:enic: Fix a use after free bug in enic_hard_start_xmit (bsc#1113431).\n- extcon: arizona: Fix some issues when HPDET IRQ fires after the jack has been unplugged (git-fixes).\n- fbdev: zero-fill colormap in fbcmap.c (git-fixes).\n- ftrace: Handle commands when closing set_ftrace_filter file (git-fixes).\n- genirq: Reduce irqdebug cacheline bouncing (bsc#1185703 ltc#192641).\n- gianfar: Handle error code at MAC address change (git-fixes).\n- gpio: xilinx: Correct kernel doc for xgpio_probe() (git-fixes).\n- gpiolib: acpi: Add quirk to ignore EC wakeups on Dell Venue 10 Pro 5055 (git-fixes).\n- i2c: cadence: add IRQ check (git-fixes).\n- i2c: emev2: add IRQ check (git-fixes).\n- i2c: i801: Do not generate an interrupt on bus reset (git-fixes).\n- i2c: i801: Do not generate an interrupt on bus reset (git-fixes).\n- i2c: jz4780: add IRQ check (git-fixes).\n- i2c: s3c2410: fix possible NULL pointer deref on read message after write (git-fixes).\n- i2c: sh7760: add IRQ check (git-fixes).\n- i2c: sh7760: fix IRQ error path (git-fixes).\n- i40e: Added Asym_Pause to supported link modes (git-fixes).\n- i40e: Fix PHY type identifiers for 2.5G and 5G adapters (jsc#SLE-4797).\n- i40e: Fix sparse errors in i40e_txrx.c (git-fixes).\n- i40e: Fix use-after-free in i40e_client_subtask() (bsc#1101816 ).\n- i40e: fix broken XDP support (git-fixes).\n- i40e: fix the panic when running bpf in xdpdrv mode (git-fixes).\n- i40e: fix the restart auto-negotiation after FEC modified (jsc#SLE-4797).\n- ibmvfc: Avoid move login if fast fail is enabled (bsc#1185938 ltc#192043).\n- ibmvfc: Handle move login failure (bsc#1185938 ltc#192043).\n- ibmvfc: Reinit target retries (bsc#1185938 ltc#192043).\n- ibmvnic: remove default label from to_string switch (bsc#1152457 ltc#174432 git-fixes).\n- igb: Fix duplicate include guard (git-fixes).\n- igb: check timestamp validity (git-fixes).\n- iio: adc: ad7793: Add missing error code in ad7793_setup() (git-fixes).\n- iio: gyro: mpu3050: Fix reported temperature value (git-fixes).\n- iio: proximity: pulsedlight: Fix rumtime PM imbalance on error (git-fixes).\n- iio: tsl2583: Fix division by a zero lux_val (git-fixes).\n- intel_th: Consistency and off-by-one fix (git-fixes).\n- ipmi/watchdog: Stop watchdog timer when the current action is \u0027none\u0027 (bsc#1184855).\n- ipw2x00: potential buffer overflow in libipw_wx_set_encodeext() (git-fixes).\n- kABI: powerpc/64: add back start_tb and accum_tb to thread_struct.\n- kabi: preserve struct header_ops after bsc#1176081 fix (bsc#1176081).\n- leds: lp5523: check return value of lp5xx_read and jump to cleanup code (git-fixes).\n- liquidio: Fix unintented sign extension of a left shift of a u16 (git-fixes).\n- mac80211: bail out if cipher schemes are invalid (git-fixes).\n- mac80211: clear sta-\u003efast_rx when STA removed from 4-addr VLAN (git-fixes).\n- mac80211: clear the beacon\u0027s CRC after channel switch (git-fixes).\n- macvlan: macvlan_count_rx() needs to be aware of preemption (git-fixes).\n- md-cluster: fix use-after-free issue when removing rdev (bsc#1184082).\n- md/raid1: properly indicate failure when ending a failed write request (bsc#1185680).\n- md: do not flush workqueue unconditionally in md_open (bsc#1184081).\n- md: factor out a mddev_find_locked helper from mddev_find (bsc#1184081).\n- md: md_open returns -EBUSY when entering racing area (bsc#1184081).\n- md: split mddev_find (bsc#1184081).\n- media: adv7604: fix possible use-after-free in adv76xx_remove() (git-fixes).\n- media: dvb-usb: fix memory leak in dvb_usb_adapter_init (git-fixes).\n- media: dvbdev: Fix memory leak in dvb_media_device_free() (git-fixes).\n- media: em28xx: fix memory leak (git-fixes).\n- media: gspca/sq905.c: fix uninitialized variable (git-fixes).\n- media: i2c: adv7842: fix possible use-after-free in adv7842_remove() (git-fixes).\n- media: ite-cir: check for receive overflow (git-fixes).\n- media: m88rs6000t: avoid potential out-of-bounds reads on arrays (git-fixes).\n- media: media/saa7164: fix saa7164_encoder_register() memory leak bugs (git-fixes).\n- media: omap4iss: return error code when omap4iss_get() failed (git-fixes).\n- mfd: lpc_sch: Partially revert \u0027Add support for Intel Quark X1000\u0027 (git-fixes).\n- mfd: stm32-timers: Avoid clearing auto reload register (git-fixes).\n- misc/uss720: fix memory leak in uss720_probe (git-fixes).\n- misc: lis3lv02d: Fix false-positive WARN on various HP models (git-fixes).\n- misc: vmw_vmci: explicitly initialize vmci_datagram payload (git-fixes).\n- misc: vmw_vmci: explicitly initialize vmci_notify_bm_set_msg struct (git-fixes).\n- mlxsw: spectrum_mr: Update egress RIF list before route\u0027s action (bsc#1112374).\n- mm: mempolicy: fix potential pte_unmap_unlock pte error (bsc#1185906).\n- mm: mempolicy: make mbind() return -EIO when MPOL_MF_STRICT is specified (bsc#1185906).\n- mmc: block: Update ext_csd.cache_ctrl if it was written (git-fixes).\n- mmc: core: Correct descriptions in mmc_of_parse() (git-fixes).\n- mmc: core: Do a power cycle when the CMD11 fails (git-fixes).\n- mmc: core: Set read only for SD cards with permanent write protect bit (git-fixes).\n- mmc: mmc_spi: Drop unused NO_IRQ definition (git-fixes).\n- mt7601u: fix always true expression (git-fixes).\n- mtd: require write permissions for locking and badblock ioctls (git-fixes).\n- net, xdp: Update pkt_type if generic XDP changes unicast MAC (bsc#1109837).\n- net/ethernet: Add parse_protocol header_ops support (bsc#1176081).\n- net/mlx4_en: update moderation when config reset (git-fixes).\n- net/mlx5e: Fix error path for ethtool set-priv-flag (git-fixes).\n- net/mlx5e: Remove the wrong assumption about transport offset (bsc#1176081).\n- net/mlx5e: Trust kernel regarding transport offset (bsc#1176081).\n- net/packet: Ask driver for protocol if not provided by user (bsc#1176081).\n- net/packet: Remove redundant skb-\u003eprotocol set (bsc#1176081).\n- net/qlcnic: Fix a use after free in qlcnic_83xx_get_minidump_template (git-fixes).\n- net: Do not set transport offset to invalid value (bsc#1176081).\n- net: Introduce parse_protocol header_ops callback (bsc#1176081).\n- net: enic: Cure the enic api locking trainwreck (git-fixes).\n- net: hns3: Fix for geneve tx checksum bug (bsc#1104353 ).\n- net: hns3: add check for HNS3_NIC_STATE_INITED in hns3_reset_notify_up_enet() (bsc#1104353).\n- net: hns3: disable phy loopback setting in hclge_mac_start_phy (bsc#1104353).\n- net: hns3: fix for vxlan gpe tx checksum bug (bsc#1104353 ).\n- net: hns3: fix incorrect configuration for igu_egu_hw_err (bsc#1104353).\n- net: hns3: initialize the message content in hclge_get_link_mode() (bsc#1126390).\n- net: hns3: use netif_tx_disable to stop the transmit queue (bsc#1104353).\n- net: phy: intel-xway: enable integrated led functions (git-fixes).\n- net: qed: RDMA personality shouldn\u0027t fail VF load (git-fixes).\n- net: thunderx: Fix unintentional sign extension issue (git-fixes).\n- net: usb: fix memory leak in smsc75xx_bind (git-fixes).\n- netdevice: Add missing IFF_PHONY_HEADROOM self-definition (git-fixes).\n- netfilter: conntrack: add new sysctl to disable RST check (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: avoid misleading \u0027invalid\u0027 in log message (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: improve RST handling when tuple is re-used (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: tcp: only close if RST matches exact sequence (bsc#1183947 bsc#1185950).\n- nfc: pn533: prevent potential memory corruption (git-fixes).\n- nvme-fc: clear q_live at beginning of association teardown (git-fixes).\n- nvme-loop: Introduce no merge flag for biovec (bsc#1174682).\n- pata_arasan_cf: fix IRQ check (git-fixes).\n- pata_ipx4xx_cf: fix IRQ check (git-fixes).\n- pcnet32: Use pci_resource_len to validate PCI resource (git-fixes).\n- phy: marvell: ARMADA375_USBCLUSTER_PHY should not default to y, unconditionally (git-fixes).\n- phy: phy-twl4030-usb: Fix possible use-after-free in twl4030_usb_remove() (git-fixes).\n- pinctrl: core: Fix kernel doc string for pin_get_name() (git-fixes).\n- pinctrl: lewisburg: Update number of pins in community (git-fixes).\n- pinctrl: samsung: use \u0027int\u0027 for register masks in Exynos (git-fixes).\n- platform/mellanox: mlxbf-tmfifo: Fix a memory barrier issue (git-fixes).\n- platform/x86: pmc_atom: Match all Beckhoff Automation baytrail boards with critclk_systems DMI table (git-fixes).\n- platform/x86: thinkpad_acpi: Correct thermal sensor allocation (git-fixes).\n- power: supply: Use IRQF_ONESHOT (git-fixes).\n- power: supply: generic-adc-battery: fix possible use-after-free in gab_remove() (git-fixes).\n- power: supply: s3c_adc_battery: fix possible use-after-free in s3c_adc_bat_remove() (git-fixes).\n- powerpc/64: remove start_tb and accum_tb from thread_struct (bsc#1186487 ltc#177613).\n- powerpc/64s: Fix crashes when toggling entry flush barrier (bsc#1177666 git-fixes).\n- powerpc/64s: Fix crashes when toggling stf barrier (bsc#1087082 git-fixes).\n- powerpc/pseries: lparcfg calculate PURR on demand (bsc#1186487 ltc#177613).\n- regulator: bd9571mwv: Fix AVS and DVFS voltage range (git-fixes).\n- rsxx: remove extraneous \u0027const\u0027 qualifier (git-fixes).\n- rtc: ds1307: Fix wday settings for rx8130 (git-fixes).\n- rtlwifi: 8821ae: upgrade PHY and RF parameters (git-fixes).\n- s390/dasd: fix hanging DASD driver unbind (bsc#1183754 LTC#192081).\n- s390/dasd: fix hanging IO request during DASD driver unbind (bsc#1183754 LTC#192081).\n- s390/entry: save the caller of psw_idle (bsc#1185677).\n- s390/kdump: fix out-of-memory with PCI (bsc#1182256 LTC#191375).\n- sata_mv: add IRQ checks (git-fixes).\n- scsi: core: Run queue in case of I/O resource contention failure (bsc#1186416).\n- scsi: libfc: Avoid invoking response handler twice if ep is already completed (bsc#1186573).\n- scsi: lpfc: Add a option to enable interlocked ABTS before job completion (bsc#1186452).\n- scsi: lpfc: Add ndlp kref accounting for resume RPI path (bsc#1186452).\n- scsi: lpfc: Fix \u0027Unexpected timeout\u0027 error in direct attach topology (bsc#1186452).\n- scsi: lpfc: Fix Node recovery when driver is handling simultaneous PLOGIs (bsc#1186452).\n- scsi: lpfc: Fix bad memory access during VPD DUMP mailbox command (bsc#1186452).\n- scsi: lpfc: Fix crash when lpfc_sli4_hba_setup() fails to initialize the SGLs (bsc#1186452).\n- scsi: lpfc: Fix node handling for Fabric Controller and Domain Controller (bsc#1186452).\n- scsi: lpfc: Fix non-optimized ERSP handling (bsc#1186452).\n- scsi: lpfc: Fix unreleased RPIs when NPIV ports are created (bsc#1186452).\n- scsi: lpfc: Ignore GID-FT response that may be received after a link flip (bsc#1186452).\n- scsi: lpfc: Reregister FPIN types if ELS_RDF is received from fabric controller (bsc#1186452).\n- scsi: lpfc: Update lpfc version to 12.8.0.10 (bsc#1186452).\n- scsi: qla2xxx: Prevent PRLI in target mode (git-fixes).\n- serial: sh-sci: Fix off-by-one error in FIFO threshold register setting (git-fixes).\n- serial: stm32: fix incorrect characters on console (git-fixes).\n- smc: disallow TCP_ULP in smc_setsockopt() (bsc#1109837).\n- soc: qcom: mdt_loader: Validate that p_filesz \u0026lt; p_memsz (git-fixes).\n- spi: dln2: Fix reference leak to master (git-fixes).\n- spi: omap-100k: Fix reference leak to master (git-fixes).\n- spi: spi-ti-qspi: Free DMA resources (git-fixes).\n- staging: emxx_udc: fix loop in _nbu2ss_nuke() (git-fixes).\n- staging: iio: cdc: ad7746: avoid overwrite of num_channels (git-fixes).\n- staging: rtl8192u: Fix potential infinite loop (git-fixes).\n- tcp: fix to update snd_wl1 in bulk receiver fast path (bsc#1185827).\n- thermal/drivers/ti-soc-thermal/bandgap Remove unused variable \u0027val\u0027 (git-fixes).\n- thunderbolt: dma_port: Fix NVM read buffer bounds and offset issue (git-fixes).\n- tpm: fix error return code in tpm2_get_cc_attrs_tbl() (git-fixes).\n- tracing: Map all PIDs to command lines (git-fixes).\n- uio: uio_hv_generic: use devm_kzalloc() for private data alloc (git-fixes).\n- uio_hv_generic: Fix a memory leak in error handling paths (git-fixes).\n- uio_hv_generic: Fix another memory leak in error handling paths (git-fixes).\n- uio_hv_generic: add missed sysfs_remove_bin_file (git-fixes).\n- usb: core: hub: fix race condition about TRSMRCY of resume (git-fixes).\n- usb: core: hub: fix race condition about TRSMRCY of resume (git-fixes).\n- usb: dwc3: gadget: Fix START_TRANSFER link state check (git-fixes).\n- usb: dwc3: omap: improve extcon initialization (git-fixes).\n- usb: fotg210-hcd: Fix an error message (git-fixes).\n- usb: sl811-hcd: improve misleading indentation (git-fixes).\n- usb: typec: tcpci: Check ROLE_CONTROL while interpreting CC_STATUS (git-fixes).\n- usb: xhci: Fix port minor revision (git-fixes).\n- usb: xhci: Increase timeout for HC halt (git-fixes).\n- usb: xhci: Increase timeout for HC halt (git-fixes).\n- vgacon: Record video mode changes with VT_RESIZEX (git-fixes).\n- video: hyperv_fb: Add ratelimit on error message (bsc#1185724).\n- vsock/vmci: log once the failed queue pair allocation (git-fixes).\n- wl3501_cs: Fix out-of-bounds warnings in wl3501_mgmt_join (git-fixes).\n- wl3501_cs: Fix out-of-bounds warnings in wl3501_send_pkt (git-fixes).\n- xhci: Do not use GFP_KERNEL in (potentially) atomic context (git-fixes).\n- xsk: Respect device\u0027s headroom and tailroom on generic xmit path (bsc#1109837).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-1887,SUSE-SLE-SERVER-12-SP5-2021-1887",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_1887-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:1887-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20211887-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:1887-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/008955.html"
},
{
"category": "self",
"summary": "SUSE Bug 1064802",
"url": "https://bugzilla.suse.com/1064802"
},
{
"category": "self",
"summary": "SUSE Bug 1066129",
"url": "https://bugzilla.suse.com/1066129"
},
{
"category": "self",
"summary": "SUSE Bug 1087082",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "self",
"summary": "SUSE Bug 1101816",
"url": "https://bugzilla.suse.com/1101816"
},
{
"category": "self",
"summary": "SUSE Bug 1103992",
"url": "https://bugzilla.suse.com/1103992"
},
{
"category": "self",
"summary": "SUSE Bug 1104427",
"url": "https://bugzilla.suse.com/1104427"
},
{
"category": "self",
"summary": "SUSE Bug 1104745",
"url": "https://bugzilla.suse.com/1104745"
},
{
"category": "self",
"summary": "SUSE Bug 1109837",
"url": "https://bugzilla.suse.com/1109837"
},
{
"category": "self",
"summary": "SUSE Bug 1112374",
"url": "https://bugzilla.suse.com/1112374"
},
{
"category": "self",
"summary": "SUSE Bug 1113431",
"url": "https://bugzilla.suse.com/1113431"
},
{
"category": "self",
"summary": "SUSE Bug 1126390",
"url": "https://bugzilla.suse.com/1126390"
},
{
"category": "self",
"summary": "SUSE Bug 1133021",
"url": "https://bugzilla.suse.com/1133021"
},
{
"category": "self",
"summary": "SUSE Bug 1152457",
"url": "https://bugzilla.suse.com/1152457"
},
{
"category": "self",
"summary": "SUSE Bug 1174682",
"url": "https://bugzilla.suse.com/1174682"
},
{
"category": "self",
"summary": "SUSE Bug 1176081",
"url": "https://bugzilla.suse.com/1176081"
},
{
"category": "self",
"summary": "SUSE Bug 1177666",
"url": "https://bugzilla.suse.com/1177666"
},
{
"category": "self",
"summary": "SUSE Bug 1180552",
"url": "https://bugzilla.suse.com/1180552"
},
{
"category": "self",
"summary": "SUSE Bug 1181383",
"url": "https://bugzilla.suse.com/1181383"
},
{
"category": "self",
"summary": "SUSE Bug 1182256",
"url": "https://bugzilla.suse.com/1182256"
},
{
"category": "self",
"summary": "SUSE Bug 1183738",
"url": "https://bugzilla.suse.com/1183738"
},
{
"category": "self",
"summary": "SUSE Bug 1183754",
"url": "https://bugzilla.suse.com/1183754"
},
{
"category": "self",
"summary": "SUSE Bug 1183947",
"url": "https://bugzilla.suse.com/1183947"
},
{
"category": "self",
"summary": "SUSE Bug 1184040",
"url": "https://bugzilla.suse.com/1184040"
},
{
"category": "self",
"summary": "SUSE Bug 1184081",
"url": "https://bugzilla.suse.com/1184081"
},
{
"category": "self",
"summary": "SUSE Bug 1184082",
"url": "https://bugzilla.suse.com/1184082"
},
{
"category": "self",
"summary": "SUSE Bug 1184611",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "self",
"summary": "SUSE Bug 1184675",
"url": "https://bugzilla.suse.com/1184675"
},
{
"category": "self",
"summary": "SUSE Bug 1184855",
"url": "https://bugzilla.suse.com/1184855"
},
{
"category": "self",
"summary": "SUSE Bug 1185428",
"url": "https://bugzilla.suse.com/1185428"
},
{
"category": "self",
"summary": "SUSE Bug 1185481",
"url": "https://bugzilla.suse.com/1185481"
},
{
"category": "self",
"summary": "SUSE Bug 1185642",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "self",
"summary": "SUSE Bug 1185680",
"url": "https://bugzilla.suse.com/1185680"
},
{
"category": "self",
"summary": "SUSE Bug 1185703",
"url": "https://bugzilla.suse.com/1185703"
},
{
"category": "self",
"summary": "SUSE Bug 1185724",
"url": "https://bugzilla.suse.com/1185724"
},
{
"category": "self",
"summary": "SUSE Bug 1185758",
"url": "https://bugzilla.suse.com/1185758"
},
{
"category": "self",
"summary": "SUSE Bug 1185859",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "self",
"summary": "SUSE Bug 1185860",
"url": "https://bugzilla.suse.com/1185860"
},
{
"category": "self",
"summary": "SUSE Bug 1185863",
"url": "https://bugzilla.suse.com/1185863"
},
{
"category": "self",
"summary": "SUSE Bug 1185898",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "self",
"summary": "SUSE Bug 1185899",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "self",
"summary": "SUSE Bug 1185906",
"url": "https://bugzilla.suse.com/1185906"
},
{
"category": "self",
"summary": "SUSE Bug 1185938",
"url": "https://bugzilla.suse.com/1185938"
},
{
"category": "self",
"summary": "SUSE Bug 1186060",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "self",
"summary": "SUSE Bug 1186062",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "self",
"summary": "SUSE Bug 1186285",
"url": "https://bugzilla.suse.com/1186285"
},
{
"category": "self",
"summary": "SUSE Bug 1186416",
"url": "https://bugzilla.suse.com/1186416"
},
{
"category": "self",
"summary": "SUSE Bug 1186439",
"url": "https://bugzilla.suse.com/1186439"
},
{
"category": "self",
"summary": "SUSE Bug 1186441",
"url": "https://bugzilla.suse.com/1186441"
},
{
"category": "self",
"summary": "SUSE Bug 1186460",
"url": "https://bugzilla.suse.com/1186460"
},
{
"category": "self",
"summary": "SUSE Bug 1186484",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24586 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24587 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24587/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26139 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26141 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26145 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26145/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26147 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23133 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23134 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32399 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33034 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33034/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33200 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3491 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3491/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-06-08T13:07:24Z",
"generator": {
"date": "2021-06-08T13:07:24Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:1887-1",
"initial_release_date": "2021-06-08T13:07:24Z",
"revision_history": [
{
"date": "2021-06-08T13:07:24Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-azure-4.12.14-16.59.1.noarch",
"product": {
"name": "kernel-devel-azure-4.12.14-16.59.1.noarch",
"product_id": "kernel-devel-azure-4.12.14-16.59.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-azure-4.12.14-16.59.1.noarch",
"product": {
"name": "kernel-source-azure-4.12.14-16.59.1.noarch",
"product_id": "kernel-source-azure-4.12.14-16.59.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-azure-4.12.14-16.59.1.x86_64",
"product": {
"name": "cluster-md-kmp-azure-4.12.14-16.59.1.x86_64",
"product_id": "cluster-md-kmp-azure-4.12.14-16.59.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-4.12.14-16.59.1.x86_64",
"product": {
"name": "dlm-kmp-azure-4.12.14-16.59.1.x86_64",
"product_id": "dlm-kmp-azure-4.12.14-16.59.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-4.12.14-16.59.1.x86_64",
"product": {
"name": "gfs2-kmp-azure-4.12.14-16.59.1.x86_64",
"product_id": "gfs2-kmp-azure-4.12.14-16.59.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-4.12.14-16.59.1.x86_64",
"product": {
"name": "kernel-azure-4.12.14-16.59.1.x86_64",
"product_id": "kernel-azure-4.12.14-16.59.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-base-4.12.14-16.59.1.x86_64",
"product": {
"name": "kernel-azure-base-4.12.14-16.59.1.x86_64",
"product_id": "kernel-azure-base-4.12.14-16.59.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-4.12.14-16.59.1.x86_64",
"product": {
"name": "kernel-azure-devel-4.12.14-16.59.1.x86_64",
"product_id": "kernel-azure-devel-4.12.14-16.59.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-4.12.14-16.59.1.x86_64",
"product": {
"name": "kernel-azure-extra-4.12.14-16.59.1.x86_64",
"product_id": "kernel-azure-extra-4.12.14-16.59.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-kgraft-devel-4.12.14-16.59.1.x86_64",
"product": {
"name": "kernel-azure-kgraft-devel-4.12.14-16.59.1.x86_64",
"product_id": "kernel-azure-kgraft-devel-4.12.14-16.59.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-azure-4.12.14-16.59.1.x86_64",
"product": {
"name": "kernel-syms-azure-4.12.14-16.59.1.x86_64",
"product_id": "kernel-syms-azure-4.12.14-16.59.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-4.12.14-16.59.1.x86_64",
"product": {
"name": "kselftests-kmp-azure-4.12.14-16.59.1.x86_64",
"product_id": "kselftests-kmp-azure-4.12.14-16.59.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-4.12.14-16.59.1.x86_64",
"product": {
"name": "ocfs2-kmp-azure-4.12.14-16.59.1.x86_64",
"product_id": "ocfs2-kmp-azure-4.12.14-16.59.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-4.12.14-16.59.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64"
},
"product_reference": "kernel-azure-4.12.14-16.59.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-base-4.12.14-16.59.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64"
},
"product_reference": "kernel-azure-base-4.12.14-16.59.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-4.12.14-16.59.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64"
},
"product_reference": "kernel-azure-devel-4.12.14-16.59.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-4.12.14-16.59.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch"
},
"product_reference": "kernel-devel-azure-4.12.14-16.59.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-4.12.14-16.59.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch"
},
"product_reference": "kernel-source-azure-4.12.14-16.59.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-4.12.14-16.59.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
},
"product_reference": "kernel-syms-azure-4.12.14-16.59.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-4.12.14-16.59.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64"
},
"product_reference": "kernel-azure-4.12.14-16.59.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-base-4.12.14-16.59.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64"
},
"product_reference": "kernel-azure-base-4.12.14-16.59.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-4.12.14-16.59.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64"
},
"product_reference": "kernel-azure-devel-4.12.14-16.59.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-4.12.14-16.59.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch"
},
"product_reference": "kernel-devel-azure-4.12.14-16.59.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-4.12.14-16.59.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch"
},
"product_reference": "kernel-source-azure-4.12.14-16.59.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-4.12.14-16.59.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
},
"product_reference": "kernel-syms-azure-4.12.14-16.59.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-24586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24586"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24586",
"url": "https://www.suse.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:24Z",
"details": "moderate"
}
],
"title": "CVE-2020-24586"
},
{
"cve": "CVE-2020-24587",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24587"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24587",
"url": "https://www.suse.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1185862 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:24Z",
"details": "moderate"
}
],
"title": "CVE-2020-24587"
},
{
"cve": "CVE-2020-26139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26139"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26139",
"url": "https://www.suse.com/security/cve/CVE-2020-26139"
},
{
"category": "external",
"summary": "SUSE Bug 1186062 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:24Z",
"details": "moderate"
}
],
"title": "CVE-2020-26139"
},
{
"cve": "CVE-2020-26141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26141"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26141",
"url": "https://www.suse.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "SUSE Bug 1185987 for CVE-2020-26141",
"url": "https://bugzilla.suse.com/1185987"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:24Z",
"details": "moderate"
}
],
"title": "CVE-2020-26141"
},
{
"cve": "CVE-2020-26145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26145"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26145",
"url": "https://www.suse.com/security/cve/CVE-2020-26145"
},
{
"category": "external",
"summary": "SUSE Bug 1185860 for CVE-2020-26145",
"url": "https://bugzilla.suse.com/1185860"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:24Z",
"details": "moderate"
}
],
"title": "CVE-2020-26145"
},
{
"cve": "CVE-2020-26147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26147"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26147",
"url": "https://www.suse.com/security/cve/CVE-2020-26147"
},
{
"category": "external",
"summary": "SUSE Bug 1233723 for CVE-2020-26147",
"url": "https://bugzilla.suse.com/1233723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:24Z",
"details": "moderate"
}
],
"title": "CVE-2020-26147"
},
{
"cve": "CVE-2021-23133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23133"
}
],
"notes": [
{
"category": "general",
"text": "A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23133",
"url": "https://www.suse.com/security/cve/CVE-2021-23133"
},
{
"category": "external",
"summary": "SUSE Bug 1184675 for CVE-2021-23133",
"url": "https://bugzilla.suse.com/1184675"
},
{
"category": "external",
"summary": "SUSE Bug 1185901 for CVE-2021-23133",
"url": "https://bugzilla.suse.com/1185901"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:24Z",
"details": "moderate"
}
],
"title": "CVE-2021-23133"
},
{
"cve": "CVE-2021-23134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23134"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23134",
"url": "https://www.suse.com/security/cve/CVE-2021-23134"
},
{
"category": "external",
"summary": "SUSE Bug 1186060 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "external",
"summary": "SUSE Bug 1186061 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "external",
"summary": "SUSE Bug 1220739 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1220739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:24Z",
"details": "important"
}
],
"title": "CVE-2021-23134"
},
{
"cve": "CVE-2021-32399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32399"
}
],
"notes": [
{
"category": "general",
"text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32399",
"url": "https://www.suse.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "SUSE Bug 1184611 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "external",
"summary": "SUSE Bug 1185898 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "external",
"summary": "SUSE Bug 1185899 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:24Z",
"details": "important"
}
],
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-33034",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33034"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33034",
"url": "https://www.suse.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "SUSE Bug 1186111 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "external",
"summary": "SUSE Bug 1186285 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:24Z",
"details": "important"
}
],
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-33200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33200"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-\u003ealu_limit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33200",
"url": "https://www.suse.com/security/cve/CVE-2021-33200"
},
{
"category": "external",
"summary": "SUSE Bug 1186484 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "external",
"summary": "SUSE Bug 1186498 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:24Z",
"details": "important"
}
],
"title": "CVE-2021-33200"
},
{
"cve": "CVE-2021-3491",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3491"
}
],
"notes": [
{
"category": "general",
"text": "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3491",
"url": "https://www.suse.com/security/cve/CVE-2021-3491"
},
{
"category": "external",
"summary": "SUSE Bug 1185642 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "external",
"summary": "SUSE Bug 1187090 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1187090"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:24Z",
"details": "important"
}
],
"title": "CVE-2021-3491"
}
]
}
suse-su-2021:1913-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-33200: Enforcing incorrect limits for pointer arithmetic operations by the BPF verifier could be abused to perform out-of-bounds reads and writes in kernel memory (bsc#1186484).\n- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values. (bsc#1186111)\n- CVE-2020-26139: Fixed a denial-of-service when an Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. (bnc#1186062)\n- CVE-2021-23134: A Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges. (bnc#1186060)\n- CVE-2021-3491: Fixed a potential heap overflow in mem_rw(). This vulnerability is related to the PROVIDE_BUFFERS operation, which allowed the MAX_RW_COUNT limit to be bypassed (bsc#1185642).\n- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).\n- CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances this can be abused to inject arbitrary network packets and/or exfiltrate user data (bnc#1185859).\n- CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed (bnc#1185859 bnc#1185862).\n- CVE-2020-26147: The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments, even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used (bnc#1185859).\n- CVE-2020-26145: An issue was discovered with Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration. (bnc#1185860)\n- CVE-2020-26141: An issue was discovered in the ALFA driver for AWUS036H, where the Message Integrity Check (authenticity) of fragmented TKIP frames was not verified. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bnc#1185987)\n- CVE-2021-23133: Fixed a race condition in SCTP sockets, which could lead to privilege escalation from the context of a network service or an unprivileged process. (bnc#1184675)\n\nThe following non-security bugs were fixed:\n\n- ACPI / hotplug / PCI: Fix reference count leak in enable_slot() (git-fixes).\n- ACPI: CPPC: Replace cppc_attr with kobj_attribute (git-fixes).\n- ACPI: GTDT: Do not corrupt interrupt mappings on watchdow probe failure (git-fixes).\n- ACPI: custom_method: fix a possible memory leak (git-fixes).\n- ACPI: custom_method: fix potential use-after-free issue (git-fixes).\n- ACPICA: Enable sleep button on ACPI legacy wake (bsc#1181383).\n- ALSA: aloop: Fix initialization of controls (git-fixes).\n- ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro (git-fixes).\n- ALSA: core: remove redundant spin_lock pair in snd_card_disconnect (git-fixes).\n- ALSA: emu8000: Fix a use after free in snd_emu8000_create_mixer (git-fixes).\n- ALSA: hda/conexant: Re-order CX5066 quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC269 Lenovo quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC269 Sony quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC882 Acer quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC882 Sony quirk table entries (git-fixes).\n- ALSA: hda/realtek: Remove redundant entry for ALC861 Haier/Uniwill devices (git-fixes).\n- ALSA: hda/realtek: reset eapd coeff to default value for alc287 (git-fixes).\n- ALSA: hdsp: do not disable if not enabled (git-fixes).\n- ALSA: hdspm: do not disable if not enabled (git-fixes).\n- ALSA: line6: Fix racy initialization of LINE6 MIDI (git-fixes).\n- ALSA: rme9652: do not disable if not enabled (git-fixes).\n- ALSA: sb: Fix two use after free in snd_sb_qsound_build (git-fixes).\n- ALSA: usb-audio: Add MIDI quirk for Vox ToneLab EX (git-fixes).\n- ALSA: usb-audio: Add error checks for usb_driver_claim_interface() calls (git-fixes).\n- ALSA: usb: midi: do not return -ENOMEM when usb_urb_ep_type_check fails (git-fixes).\n- ARM: footbridge: fix PCI interrupt mapping (git-fixes).\n- ASoC: cs35l33: fix an error code in probe() (git-fixes).\n- ASoC: cs42l42: Regmap must use_single_read/write (git-fixes).\n- ASoC: fsl_esai: Fix TDM slot setup for I2S mode (git-fixes).\n- ASoC: intel: atom: Stop advertising non working S24LE support (git-fixes).\n- ASoC: rt286: Generalize support for ALC3263 codec (git-fixes).\n- ASoC: rt286: Make RT286_SET_GPIO_* readable and writable (git-fixes).\n- ASoC: wm8960: Fix wrong bclk and lrclk with pll enabled for some chips (git-fixes).\n- Bluetooth: SMP: Fail if remote and local public keys are identical (git-fixes).\n- Bluetooth: Set CONF_NOT_COMPLETE as l2cap_chan default (git-fixes).\n- Bluetooth: initialize skb_queue_head at l2cap_chan_create() (git-fixes).\n- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185724).\n- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185724).\n- Drivers: hv: vmbus: Use after free in __vmbus_open() (git-fixes).\n- EDAC/amd64: Gather hardware information early (bsc#1180552).\n- EDAC/amd64: Make struct amd64_family_type global (bsc#1180552).\n- EDAC/amd64: Save max number of controllers to family type (bsc#1180552).\n- HID: alps: fix error return code in alps_input_configured() (git-fixes).\n- HID: plantronics: Workaround for double volume key presses (git-fixes).\n- HID: wacom: Assign boolean values to a bool variable (git-fixes).\n- HID: wacom: set EV_KEY and EV_ABS only for non-HID_GENERIC type of devices (git-fixes).\n- Input: elants_i2c - do not bind to i2c-hid compatible ACPI instantiated devices (git-fixes).\n- Input: i8042 - fix Pegatron C15B ID entry (git-fixes).\n- Input: nspire-keypad - enable interrupts only when opened (git-fixes).\n- Input: silead - add workaround for x86 BIOS-es which bring the chip up in a stuck state (git-fixes).\n- KVM: s390: fix guarded storage control register handling (bsc#1133021).\n- NFC: fix possible resource leak (git-fixes).\n- NFC: fix resource leak when target index is invalid (git-fixes).\n- NFC: nci: fix memory leak in nci_allocate_device (git-fixes).\n- NFSv4: Replace closed stateids with the \u0027invalid special stateid\u0027 (bsc#1185481).\n- PCI: PM: Do not read power state in pci_enable_device_flags() (git-fixes).\n- PCI: Release OF node in pci_scan_device()\u0027s error path (git-fixes).\n- RDMA/hns: Delete redundant condition judgment related to eq (bsc#1104427).\n- RDMA/srpt: Fix error return code in srpt_cm_req_recv() (bsc#1103992).\n- SUNRPC in case of backlog, hand free slots directly to waiting task (bsc#1185428).\n- SUNRPC: More fixes for backlog congestion (bsc#1185428).\n- USB: Add LPM quirk for Lenovo ThinkPad USB-C Dock Gen2 Ethernet (git-fixes).\n- USB: Add reset-resume quirk for WD19\u0027s Realtek Hub (git-fixes).\n- USB: serial: fix return value for unsupported ioctls (git-fixes).\n- USB: serial: usb_wwan: fix unprivileged TIOCCSERIAL (git-fixes).\n- USB: trancevibrator: fix control-request direction (git-fixes).\n- af_packet: fix the tx skb protocol in raw sockets with ETH_P_ALL (bsc#1176081).\n- ata: libahci_platform: fix IRQ check (git-fixes).\n- ath9k: Fix error check in ath9k_hw_read_revisions() for PCI devices (git-fixes).\n- backlight: journada720: Fix Wmisleading-indentation warning (git-fixes).\n- batman-adv: Do not always reallocate the fragmentation skb head (git-fixes).\n- bluetooth: eliminate the potential race condition when removing the HCI controller (git-fixes).\n- bnxt_en: Fix PCI AER error recovery flow (git-fixes).\n- bnxt_en: fix ternary sign extension bug in bnxt_show_temp() (bsc#1104745).\n- bpf: Fix masking negation logic upon negative dst register (git-fixes).\n- btrfs: fix race between transaction aborts and fsyncs leading to use-after-free (bsc#1186441).\n- btrfs: fix race when picking most recent mod log operation for an old root (bsc#1186439).\n- bus: qcom: Put child node before return (git-fixes).\n- cfg80211: remove WARN_ON() in cfg80211_sme_connect (git-fixes).\n- cfg80211: scan: drop entry from hidden_list on overflow (git-fixes).\n- clk: exynos7: Mark aclk_fsys1_200 as critical (git-fixes).\n- clk: fix invalid usage of list cursor in register (git-fixes).\n- clk: fix invalid usage of list cursor in unregister (git-fixes).\n- clk: mvebu: armada-37xx-periph: Fix switching CPU freq from 250 Mhz to 1 GHz (git-fixes).\n- clk: mvebu: armada-37xx-periph: Fix workaround for switching from L1 to L0 (git-fixes).\n- clk: mvebu: armada-37xx-periph: remove .set_parent method for CPU PM clock (git-fixes).\n- clk: socfpga: fix iomem pointer cast on 64-bit (git-fixes).\n- clk: uniphier: Fix potential infinite loop (git-fixes).\n- cpufreq: Add NULL checks to show() and store() methods of cpufreq (bsc#1184040).\n- cpufreq: Avoid cpufreq_suspend() deadlock on system shutdown (bsc#1184040).\n- cpufreq: Kconfig: fix documentation links (git-fixes).\n- cpufreq: intel_pstate: Add Icelake servers support in no-HWP mode (bsc#1185758).\n- crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init (git-fixes).\n- crypto: qat - Fix a double free in adf_create_ring (git-fixes).\n- crypto: qat - do not release uninitialized resources (git-fixes).\n- crypto: qat - fix error path in adf_isr_resource_alloc() (git-fixes).\n- cxgb4: Fix unintentional sign extension issues (bsc#1064802 bsc#1066129).\n- dm: fix redundant IO accounting for bios that need splitting (bsc#1183738).\n- dmaengine: dw: Make it dependent to HAS_IOMEM (git-fixes).\n- docs: kernel-parameters: Add gpio_mockup_named_lines (git-fixes).\n- docs: kernel-parameters: Move gpio-mockup for alphabetic order (git-fixes).\n- drivers: net: fix memory leak in atusb_probe (git-fixes).\n- drivers: net: fix memory leak in peak_usb_create_dev (git-fixes).\n- drm/amdgpu : Fix asic reset regression issue introduce by 8f211fe8ac7c4f (git-fixes).\n- drm/amdgpu: fix NULL pointer dereference (git-fixes).\n- drm/amdkfd: fix build error with AMD_IOMMU_V2=m (git-fixes).\n- drm/i915/gvt: Fix error code in intel_gvt_init_device() (git-fixes).\n- drm/imx: imx-ldb: fix out of bounds array access warning (git-fixes).\n- drm/meson: fix shutdown crash when component not probed (git-fixes).\n- drm/msm/mdp5: Configure PP_SYNC_HEIGHT to double the vtotal (git-fixes).\n- drm/omap: fix misleading indentation in pixinc() (git-fixes).\n- drm/radeon/dpm: Disable sclk switching on Oland when two 4K 60Hz monitors are connected (git-fixes).\n- drm/radeon: Fix off-by-one power_state index heap overwrite (git-fixes).\n- drm/radeon: fix copy of uninitialized variable back to userspace (git-fixes).\n- e1000e: Fix duplicate include guard (git-fixes).\n- e1000e: Fix error handling in e1000_set_d0_lplu_state_82571 (git-fixes).\n- e1000e: add rtnl_lock() to e1000_reset_task (git-fixes).\n- ethernet:enic: Fix a use after free bug in enic_hard_start_xmit (bsc#1113431).\n- extcon: arizona: Fix some issues when HPDET IRQ fires after the jack has been unplugged (git-fixes).\n- fbdev: zero-fill colormap in fbcmap.c (git-fixes).\n- ftrace: Handle commands when closing set_ftrace_filter file (git-fixes).\n- genirq: Reduce irqdebug cacheline bouncing (bsc#1185703 ltc#192641).\n- gianfar: Handle error code at MAC address change (git-fixes).\n- gpio: xilinx: Correct kernel doc for xgpio_probe() (git-fixes).\n- gpiolib: acpi: Add quirk to ignore EC wakeups on Dell Venue 10 Pro 5055 (git-fixes).\n- i2c: cadence: add IRQ check (git-fixes).\n- i2c: emev2: add IRQ check (git-fixes).\n- i2c: i801: Do not generate an interrupt on bus reset (git-fixes).\n- i2c: i801: Do not generate an interrupt on bus reset (git-fixes).\n- i2c: jz4780: add IRQ check (git-fixes).\n- i2c: s3c2410: fix possible NULL pointer deref on read message after write (git-fixes).\n- i2c: sh7760: add IRQ check (git-fixes).\n- i2c: sh7760: fix IRQ error path (git-fixes).\n- i40e: Added Asym_Pause to supported link modes (git-fixes).\n- i40e: Fix PHY type identifiers for 2.5G and 5G adapters (jsc#SLE-4797).\n- i40e: Fix sparse errors in i40e_txrx.c (git-fixes).\n- i40e: Fix use-after-free in i40e_client_subtask() (bsc#1101816 ).\n- i40e: fix broken XDP support (git-fixes).\n- i40e: fix the panic when running bpf in xdpdrv mode (git-fixes).\n- i40e: fix the restart auto-negotiation after FEC modified (jsc#SLE-4797).\n- ibmvfc: Avoid move login if fast fail is enabled (bsc#1185938 ltc#192043).\n- ibmvfc: Handle move login failure (bsc#1185938 ltc#192043).\n- ibmvfc: Reinit target retries (bsc#1185938 ltc#192043).\n- ibmvnic: remove default label from to_string switch (bsc#1152457 ltc#174432 git-fixes).\n- igb: Fix duplicate include guard (git-fixes).\n- igb: check timestamp validity (git-fixes).\n- iio: adc: ad7793: Add missing error code in ad7793_setup() (git-fixes).\n- iio: gyro: mpu3050: Fix reported temperature value (git-fixes).\n- iio: proximity: pulsedlight: Fix rumtime PM imbalance on error (git-fixes).\n- iio: tsl2583: Fix division by a zero lux_val (git-fixes).\n- intel_th: Consistency and off-by-one fix (git-fixes).\n- ipmi/watchdog: Stop watchdog timer when the current action is \u0027none\u0027 (bsc#1184855).\n- ipw2x00: potential buffer overflow in libipw_wx_set_encodeext() (git-fixes).\n- kABI: powerpc/64: add back start_tb and accum_tb to thread_struct.\n- kabi: preserve struct header_ops after bsc#1176081 fix (bsc#1176081).\n- leds: lp5523: check return value of lp5xx_read and jump to cleanup code (git-fixes).\n- liquidio: Fix unintented sign extension of a left shift of a u16 (git-fixes).\n- mac80211: bail out if cipher schemes are invalid (git-fixes).\n- mac80211: clear sta-\u003efast_rx when STA removed from 4-addr VLAN (git-fixes).\n- mac80211: clear the beacon\u0027s CRC after channel switch (git-fixes).\n- macvlan: macvlan_count_rx() needs to be aware of preemption (git-fixes).\n- md-cluster: fix use-after-free issue when removing rdev (bsc#1184082).\n- md/raid1: properly indicate failure when ending a failed write request (bsc#1185680).\n- md: do not flush workqueue unconditionally in md_open (bsc#1184081).\n- md: factor out a mddev_find_locked helper from mddev_find (bsc#1184081).\n- md: md_open returns -EBUSY when entering racing area (bsc#1184081).\n- md: split mddev_find (bsc#1184081).\n- media: adv7604: fix possible use-after-free in adv76xx_remove() (git-fixes).\n- media: dvb-usb: fix memory leak in dvb_usb_adapter_init (git-fixes).\n- media: dvbdev: Fix memory leak in dvb_media_device_free() (git-fixes).\n- media: em28xx: fix memory leak (git-fixes).\n- media: gspca/sq905.c: fix uninitialized variable (git-fixes).\n- media: i2c: adv7842: fix possible use-after-free in adv7842_remove() (git-fixes).\n- media: ite-cir: check for receive overflow (git-fixes).\n- media: m88rs6000t: avoid potential out-of-bounds reads on arrays (git-fixes).\n- media: media/saa7164: fix saa7164_encoder_register() memory leak bugs (git-fixes).\n- media: omap4iss: return error code when omap4iss_get() failed (git-fixes).\n- mfd: lpc_sch: Partially revert \u0027Add support for Intel Quark X1000\u0027 (git-fixes).\n- mfd: stm32-timers: Avoid clearing auto reload register (git-fixes).\n- misc/uss720: fix memory leak in uss720_probe (git-fixes).\n- misc: lis3lv02d: Fix false-positive WARN on various HP models (git-fixes).\n- misc: vmw_vmci: explicitly initialize vmci_datagram payload (git-fixes).\n- misc: vmw_vmci: explicitly initialize vmci_notify_bm_set_msg struct (git-fixes).\n- mlxsw: spectrum_mr: Update egress RIF list before route\u0027s action (bsc#1112374).\n- mm: mempolicy: fix potential pte_unmap_unlock pte error (bsc#1185906).\n- mm: mempolicy: make mbind() return -EIO when MPOL_MF_STRICT is specified (bsc#1185906).\n- mmc: block: Update ext_csd.cache_ctrl if it was written (git-fixes).\n- mmc: core: Correct descriptions in mmc_of_parse() (git-fixes).\n- mmc: core: Do a power cycle when the CMD11 fails (git-fixes).\n- mmc: core: Set read only for SD cards with permanent write protect bit (git-fixes).\n- mmc: mmc_spi: Drop unused NO_IRQ definition (git-fixes).\n- mt7601u: fix always true expression (git-fixes).\n- mtd: require write permissions for locking and badblock ioctls (git-fixes).\n- net, xdp: Update pkt_type if generic XDP changes unicast MAC (bsc#1109837).\n- net/ethernet: Add parse_protocol header_ops support (bsc#1176081).\n- net/mlx4_en: update moderation when config reset (git-fixes).\n- net/mlx5e: Fix error path for ethtool set-priv-flag (git-fixes).\n- net/mlx5e: Remove the wrong assumption about transport offset (bsc#1176081).\n- net/mlx5e: Trust kernel regarding transport offset (bsc#1176081).\n- net/packet: Ask driver for protocol if not provided by user (bsc#1176081).\n- net/packet: Remove redundant skb-\u003eprotocol set (bsc#1176081).\n- net/qlcnic: Fix a use after free in qlcnic_83xx_get_minidump_template (git-fixes).\n- net: Do not set transport offset to invalid value (bsc#1176081).\n- net: Introduce parse_protocol header_ops callback (bsc#1176081).\n- net: enic: Cure the enic api locking trainwreck (git-fixes).\n- net: hns3: Fix for geneve tx checksum bug (bsc#1104353 ).\n- net: hns3: add check for HNS3_NIC_STATE_INITED in hns3_reset_notify_up_enet() (bsc#1104353).\n- net: hns3: disable phy loopback setting in hclge_mac_start_phy (bsc#1104353).\n- net: hns3: fix for vxlan gpe tx checksum bug (bsc#1104353 ).\n- net: hns3: fix incorrect configuration for igu_egu_hw_err (bsc#1104353).\n- net: hns3: initialize the message content in hclge_get_link_mode() (bsc#1126390).\n- net: hns3: use netif_tx_disable to stop the transmit queue (bsc#1104353).\n- net: phy: intel-xway: enable integrated led functions (git-fixes).\n- net: qed: RDMA personality shouldn\u0027t fail VF load (git-fixes).\n- net: thunderx: Fix unintentional sign extension issue (git-fixes).\n- net: usb: fix memory leak in smsc75xx_bind (git-fixes).\n- netdevice: Add missing IFF_PHONY_HEADROOM self-definition (git-fixes).\n- netfilter: conntrack: add new sysctl to disable RST check (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: avoid misleading \u0027invalid\u0027 in log message (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: improve RST handling when tuple is re-used (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: tcp: only close if RST matches exact sequence (bsc#1183947 bsc#1185950).\n- nfc: pn533: prevent potential memory corruption (git-fixes).\n- nvme-fc: clear q_live at beginning of association teardown (git-fixes).\n- nvme-loop: Introduce no merge flag for biovec (bsc#1174682).\n- pata_arasan_cf: fix IRQ check (git-fixes).\n- pata_ipx4xx_cf: fix IRQ check (git-fixes).\n- pcnet32: Use pci_resource_len to validate PCI resource (git-fixes).\n- phy: marvell: ARMADA375_USBCLUSTER_PHY should not default to y, unconditionally (git-fixes).\n- phy: phy-twl4030-usb: Fix possible use-after-free in twl4030_usb_remove() (git-fixes).\n- pinctrl: core: Fix kernel doc string for pin_get_name() (git-fixes).\n- pinctrl: lewisburg: Update number of pins in community (git-fixes).\n- pinctrl: samsung: use \u0027int\u0027 for register masks in Exynos (git-fixes).\n- platform/mellanox: mlxbf-tmfifo: Fix a memory barrier issue (git-fixes).\n- platform/x86: pmc_atom: Match all Beckhoff Automation baytrail boards with critclk_systems DMI table (git-fixes).\n- platform/x86: thinkpad_acpi: Correct thermal sensor allocation (git-fixes).\n- power: supply: Use IRQF_ONESHOT (git-fixes).\n- power: supply: generic-adc-battery: fix possible use-after-free in gab_remove() (git-fixes).\n- power: supply: s3c_adc_battery: fix possible use-after-free in s3c_adc_bat_remove() (git-fixes).\n- powerpc/64: remove start_tb and accum_tb from thread_struct (bsc#1186487 ltc#177613).\n- powerpc/64s: Fix crashes when toggling entry flush barrier (bsc#1177666 git-fixes).\n- powerpc/64s: Fix crashes when toggling stf barrier (bsc#1087082 git-fixes).\n- powerpc/pseries: lparcfg calculate PURR on demand (bsc#1186487 ltc#177613).\n- regulator: bd9571mwv: Fix AVS and DVFS voltage range (git-fixes).\n- rsxx: remove extraneous \u0027const\u0027 qualifier (git-fixes).\n- rtc: ds1307: Fix wday settings for rx8130 (git-fixes).\n- rtlwifi: 8821ae: upgrade PHY and RF parameters (git-fixes).\n- s390/dasd: fix hanging DASD driver unbind (bsc#1183754 LTC#192081).\n- s390/dasd: fix hanging IO request during DASD driver unbind (bsc#1183754 LTC#192081).\n- s390/entry: save the caller of psw_idle (bsc#1185677).\n- s390/kdump: fix out-of-memory with PCI (bsc#1182256 LTC#191375).\n- sata_mv: add IRQ checks (git-fixes).\n- scsi: core: Run queue in case of I/O resource contention failure (bsc#1186416).\n- scsi: libfc: Avoid invoking response handler twice if ep is already completed (bsc#1186573).\n- scsi: lpfc: Add a option to enable interlocked ABTS before job completion (bsc#1186452).\n- scsi: lpfc: Add ndlp kref accounting for resume RPI path (bsc#1186452).\n- scsi: lpfc: Fix \u0027Unexpected timeout\u0027 error in direct attach topology (bsc#1186452).\n- scsi: lpfc: Fix Node recovery when driver is handling simultaneous PLOGIs (bsc#1186452).\n- scsi: lpfc: Fix bad memory access during VPD DUMP mailbox command (bsc#1186452).\n- scsi: lpfc: Fix crash when lpfc_sli4_hba_setup() fails to initialize the SGLs (bsc#1186452).\n- scsi: lpfc: Fix node handling for Fabric Controller and Domain Controller (bsc#1186452).\n- scsi: lpfc: Fix non-optimized ERSP handling (bsc#1186452).\n- scsi: lpfc: Fix unreleased RPIs when NPIV ports are created (bsc#1186452).\n- scsi: lpfc: Ignore GID-FT response that may be received after a link flip (bsc#1186452).\n- scsi: lpfc: Reregister FPIN types if ELS_RDF is received from fabric controller (bsc#1186452).\n- scsi: lpfc: Update lpfc version to 12.8.0.10 (bsc#1186452).\n- scsi: qla2xxx: Prevent PRLI in target mode (git-fixes).\n- serial: sh-sci: Fix off-by-one error in FIFO threshold register setting (git-fixes).\n- serial: stm32: fix incorrect characters on console (git-fixes).\n- smc: disallow TCP_ULP in smc_setsockopt() (bsc#1109837).\n- soc: qcom: mdt_loader: Validate that p_filesz \u0026lt; p_memsz (git-fixes).\n- spi: dln2: Fix reference leak to master (git-fixes).\n- spi: omap-100k: Fix reference leak to master (git-fixes).\n- spi: spi-ti-qspi: Free DMA resources (git-fixes).\n- staging: emxx_udc: fix loop in _nbu2ss_nuke() (git-fixes).\n- staging: iio: cdc: ad7746: avoid overwrite of num_channels (git-fixes).\n- staging: rtl8192u: Fix potential infinite loop (git-fixes).\n- tcp: fix to update snd_wl1 in bulk receiver fast path (bsc#1185827).\n- thermal/drivers/ti-soc-thermal/bandgap Remove unused variable \u0027val\u0027 (git-fixes).\n- thunderbolt: dma_port: Fix NVM read buffer bounds and offset issue (git-fixes).\n- tpm: fix error return code in tpm2_get_cc_attrs_tbl() (git-fixes).\n- tracing: Map all PIDs to command lines (git-fixes).\n- uio: uio_hv_generic: use devm_kzalloc() for private data alloc (git-fixes).\n- uio_hv_generic: Fix a memory leak in error handling paths (git-fixes).\n- uio_hv_generic: Fix another memory leak in error handling paths (git-fixes).\n- uio_hv_generic: add missed sysfs_remove_bin_file (git-fixes).\n- usb: core: hub: fix race condition about TRSMRCY of resume (git-fixes).\n- usb: core: hub: fix race condition about TRSMRCY of resume (git-fixes).\n- usb: dwc3: gadget: Fix START_TRANSFER link state check (git-fixes).\n- usb: dwc3: omap: improve extcon initialization (git-fixes).\n- usb: fotg210-hcd: Fix an error message (git-fixes).\n- usb: sl811-hcd: improve misleading indentation (git-fixes).\n- usb: typec: tcpci: Check ROLE_CONTROL while interpreting CC_STATUS (git-fixes).\n- usb: xhci: Fix port minor revision (git-fixes).\n- usb: xhci: Increase timeout for HC halt (git-fixes).\n- usb: xhci: Increase timeout for HC halt (git-fixes).\n- vgacon: Record video mode changes with VT_RESIZEX (git-fixes).\n- video: hyperv_fb: Add ratelimit on error message (bsc#1185724).\n- vsock/vmci: log once the failed queue pair allocation (git-fixes).\n- wl3501_cs: Fix out-of-bounds warnings in wl3501_mgmt_join (git-fixes).\n- wl3501_cs: Fix out-of-bounds warnings in wl3501_send_pkt (git-fixes).\n- xhci: Do not use GFP_KERNEL in (potentially) atomic context (git-fixes).\n- xsk: Respect device\u0027s headroom and tailroom on generic xmit path (bsc#1109837).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-1913,SUSE-SLE-HA-12-SP5-2021-1913,SUSE-SLE-Live-Patching-12-SP5-2021-1913,SUSE-SLE-SDK-12-SP5-2021-1913,SUSE-SLE-SERVER-12-SP5-2021-1913,SUSE-SLE-WE-12-SP5-2021-1913",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_1913-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:1913-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20211913-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:1913-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/008973.html"
},
{
"category": "self",
"summary": "SUSE Bug 1064802",
"url": "https://bugzilla.suse.com/1064802"
},
{
"category": "self",
"summary": "SUSE Bug 1066129",
"url": "https://bugzilla.suse.com/1066129"
},
{
"category": "self",
"summary": "SUSE Bug 1087082",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "self",
"summary": "SUSE Bug 1101816",
"url": "https://bugzilla.suse.com/1101816"
},
{
"category": "self",
"summary": "SUSE Bug 1103992",
"url": "https://bugzilla.suse.com/1103992"
},
{
"category": "self",
"summary": "SUSE Bug 1104353",
"url": "https://bugzilla.suse.com/1104353"
},
{
"category": "self",
"summary": "SUSE Bug 1104427",
"url": "https://bugzilla.suse.com/1104427"
},
{
"category": "self",
"summary": "SUSE Bug 1104745",
"url": "https://bugzilla.suse.com/1104745"
},
{
"category": "self",
"summary": "SUSE Bug 1109837",
"url": "https://bugzilla.suse.com/1109837"
},
{
"category": "self",
"summary": "SUSE Bug 1112374",
"url": "https://bugzilla.suse.com/1112374"
},
{
"category": "self",
"summary": "SUSE Bug 1113431",
"url": "https://bugzilla.suse.com/1113431"
},
{
"category": "self",
"summary": "SUSE Bug 1126390",
"url": "https://bugzilla.suse.com/1126390"
},
{
"category": "self",
"summary": "SUSE Bug 1133021",
"url": "https://bugzilla.suse.com/1133021"
},
{
"category": "self",
"summary": "SUSE Bug 1152457",
"url": "https://bugzilla.suse.com/1152457"
},
{
"category": "self",
"summary": "SUSE Bug 1174682",
"url": "https://bugzilla.suse.com/1174682"
},
{
"category": "self",
"summary": "SUSE Bug 1176081",
"url": "https://bugzilla.suse.com/1176081"
},
{
"category": "self",
"summary": "SUSE Bug 1177666",
"url": "https://bugzilla.suse.com/1177666"
},
{
"category": "self",
"summary": "SUSE Bug 1180552",
"url": "https://bugzilla.suse.com/1180552"
},
{
"category": "self",
"summary": "SUSE Bug 1181383",
"url": "https://bugzilla.suse.com/1181383"
},
{
"category": "self",
"summary": "SUSE Bug 1182256",
"url": "https://bugzilla.suse.com/1182256"
},
{
"category": "self",
"summary": "SUSE Bug 1183738",
"url": "https://bugzilla.suse.com/1183738"
},
{
"category": "self",
"summary": "SUSE Bug 1183754",
"url": "https://bugzilla.suse.com/1183754"
},
{
"category": "self",
"summary": "SUSE Bug 1183947",
"url": "https://bugzilla.suse.com/1183947"
},
{
"category": "self",
"summary": "SUSE Bug 1184040",
"url": "https://bugzilla.suse.com/1184040"
},
{
"category": "self",
"summary": "SUSE Bug 1184081",
"url": "https://bugzilla.suse.com/1184081"
},
{
"category": "self",
"summary": "SUSE Bug 1184082",
"url": "https://bugzilla.suse.com/1184082"
},
{
"category": "self",
"summary": "SUSE Bug 1184611",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "self",
"summary": "SUSE Bug 1184675",
"url": "https://bugzilla.suse.com/1184675"
},
{
"category": "self",
"summary": "SUSE Bug 1184855",
"url": "https://bugzilla.suse.com/1184855"
},
{
"category": "self",
"summary": "SUSE Bug 1185428",
"url": "https://bugzilla.suse.com/1185428"
},
{
"category": "self",
"summary": "SUSE Bug 1185481",
"url": "https://bugzilla.suse.com/1185481"
},
{
"category": "self",
"summary": "SUSE Bug 1185642",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "self",
"summary": "SUSE Bug 1185677",
"url": "https://bugzilla.suse.com/1185677"
},
{
"category": "self",
"summary": "SUSE Bug 1185680",
"url": "https://bugzilla.suse.com/1185680"
},
{
"category": "self",
"summary": "SUSE Bug 1185703",
"url": "https://bugzilla.suse.com/1185703"
},
{
"category": "self",
"summary": "SUSE Bug 1185724",
"url": "https://bugzilla.suse.com/1185724"
},
{
"category": "self",
"summary": "SUSE Bug 1185758",
"url": "https://bugzilla.suse.com/1185758"
},
{
"category": "self",
"summary": "SUSE Bug 1185827",
"url": "https://bugzilla.suse.com/1185827"
},
{
"category": "self",
"summary": "SUSE Bug 1185859",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "self",
"summary": "SUSE Bug 1185860",
"url": "https://bugzilla.suse.com/1185860"
},
{
"category": "self",
"summary": "SUSE Bug 1185862",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "self",
"summary": "SUSE Bug 1185863",
"url": "https://bugzilla.suse.com/1185863"
},
{
"category": "self",
"summary": "SUSE Bug 1185898",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "self",
"summary": "SUSE Bug 1185899",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "self",
"summary": "SUSE Bug 1185901",
"url": "https://bugzilla.suse.com/1185901"
},
{
"category": "self",
"summary": "SUSE Bug 1185906",
"url": "https://bugzilla.suse.com/1185906"
},
{
"category": "self",
"summary": "SUSE Bug 1185938",
"url": "https://bugzilla.suse.com/1185938"
},
{
"category": "self",
"summary": "SUSE Bug 1185950",
"url": "https://bugzilla.suse.com/1185950"
},
{
"category": "self",
"summary": "SUSE Bug 1185987",
"url": "https://bugzilla.suse.com/1185987"
},
{
"category": "self",
"summary": "SUSE Bug 1186060",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "self",
"summary": "SUSE Bug 1186061",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "self",
"summary": "SUSE Bug 1186062",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "self",
"summary": "SUSE Bug 1186111",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "self",
"summary": "SUSE Bug 1186285",
"url": "https://bugzilla.suse.com/1186285"
},
{
"category": "self",
"summary": "SUSE Bug 1186390",
"url": "https://bugzilla.suse.com/1186390"
},
{
"category": "self",
"summary": "SUSE Bug 1186416",
"url": "https://bugzilla.suse.com/1186416"
},
{
"category": "self",
"summary": "SUSE Bug 1186439",
"url": "https://bugzilla.suse.com/1186439"
},
{
"category": "self",
"summary": "SUSE Bug 1186441",
"url": "https://bugzilla.suse.com/1186441"
},
{
"category": "self",
"summary": "SUSE Bug 1186452",
"url": "https://bugzilla.suse.com/1186452"
},
{
"category": "self",
"summary": "SUSE Bug 1186460",
"url": "https://bugzilla.suse.com/1186460"
},
{
"category": "self",
"summary": "SUSE Bug 1186484",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "self",
"summary": "SUSE Bug 1186487",
"url": "https://bugzilla.suse.com/1186487"
},
{
"category": "self",
"summary": "SUSE Bug 1186498",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "self",
"summary": "SUSE Bug 1186573",
"url": "https://bugzilla.suse.com/1186573"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24586 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24587 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24587/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26139 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26141 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26145 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26145/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26147 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23133 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23134 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32399 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33034 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33034/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33200 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3491 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3491/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-06-09T11:55:09Z",
"generator": {
"date": "2021-06-09T11:55:09Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:1913-1",
"initial_release_date": "2021-06-09T11:55:09Z",
"revision_history": [
{
"date": "2021-06-09T11:55:09Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.74.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.74.1.aarch64",
"product_id": "cluster-md-kmp-default-4.12.14-122.74.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.74.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.12.14-122.74.1.aarch64",
"product_id": "dlm-kmp-default-4.12.14-122.74.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.74.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.74.1.aarch64",
"product_id": "gfs2-kmp-default-4.12.14-122.74.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.74.1.aarch64",
"product": {
"name": "kernel-default-4.12.14-122.74.1.aarch64",
"product_id": "kernel-default-4.12.14-122.74.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.74.1.aarch64",
"product": {
"name": "kernel-default-base-4.12.14-122.74.1.aarch64",
"product_id": "kernel-default-base-4.12.14-122.74.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.74.1.aarch64",
"product": {
"name": "kernel-default-devel-4.12.14-122.74.1.aarch64",
"product_id": "kernel-default-devel-4.12.14-122.74.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.74.1.aarch64",
"product": {
"name": "kernel-default-extra-4.12.14-122.74.1.aarch64",
"product_id": "kernel-default-extra-4.12.14-122.74.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.74.1.aarch64",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.74.1.aarch64",
"product_id": "kernel-default-kgraft-4.12.14-122.74.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-122.74.1.aarch64",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-122.74.1.aarch64",
"product_id": "kernel-default-kgraft-devel-4.12.14-122.74.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.74.1.aarch64",
"product": {
"name": "kernel-obs-build-4.12.14-122.74.1.aarch64",
"product_id": "kernel-obs-build-4.12.14-122.74.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.74.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.12.14-122.74.1.aarch64",
"product_id": "kernel-obs-qa-4.12.14-122.74.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.74.1.aarch64",
"product": {
"name": "kernel-syms-4.12.14-122.74.1.aarch64",
"product_id": "kernel-syms-4.12.14-122.74.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.74.1.aarch64",
"product": {
"name": "kernel-vanilla-4.12.14-122.74.1.aarch64",
"product_id": "kernel-vanilla-4.12.14-122.74.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.74.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.74.1.aarch64",
"product_id": "kernel-vanilla-base-4.12.14-122.74.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.74.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.74.1.aarch64",
"product_id": "kernel-vanilla-devel-4.12.14-122.74.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.74.1.aarch64",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.74.1.aarch64",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.74.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.74.1.aarch64",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.74.1.aarch64",
"product_id": "kselftests-kmp-default-4.12.14-122.74.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.74.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.74.1.aarch64",
"product_id": "ocfs2-kmp-default-4.12.14-122.74.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.12.14-122.74.1.noarch",
"product": {
"name": "kernel-devel-4.12.14-122.74.1.noarch",
"product_id": "kernel-devel-4.12.14-122.74.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.12.14-122.74.2.noarch",
"product": {
"name": "kernel-docs-4.12.14-122.74.2.noarch",
"product_id": "kernel-docs-4.12.14-122.74.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.12.14-122.74.2.noarch",
"product": {
"name": "kernel-docs-html-4.12.14-122.74.2.noarch",
"product_id": "kernel-docs-html-4.12.14-122.74.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.12.14-122.74.1.noarch",
"product": {
"name": "kernel-macros-4.12.14-122.74.1.noarch",
"product_id": "kernel-macros-4.12.14-122.74.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.12.14-122.74.1.noarch",
"product": {
"name": "kernel-source-4.12.14-122.74.1.noarch",
"product_id": "kernel-source-4.12.14-122.74.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.12.14-122.74.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.12.14-122.74.1.noarch",
"product_id": "kernel-source-vanilla-4.12.14-122.74.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.12.14-122.74.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"product_id": "dlm-kmp-default-4.12.14-122.74.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"product_id": "gfs2-kmp-default-4.12.14-122.74.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-122.74.1.ppc64le",
"product": {
"name": "kernel-debug-4.12.14-122.74.1.ppc64le",
"product_id": "kernel-debug-4.12.14-122.74.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-122.74.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.12.14-122.74.1.ppc64le",
"product_id": "kernel-debug-base-4.12.14-122.74.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-122.74.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.12.14-122.74.1.ppc64le",
"product_id": "kernel-debug-devel-4.12.14-122.74.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-devel-4.12.14-122.74.1.ppc64le",
"product": {
"name": "kernel-debug-kgraft-devel-4.12.14-122.74.1.ppc64le",
"product_id": "kernel-debug-kgraft-devel-4.12.14-122.74.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.74.1.ppc64le",
"product": {
"name": "kernel-default-4.12.14-122.74.1.ppc64le",
"product_id": "kernel-default-4.12.14-122.74.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.74.1.ppc64le",
"product": {
"name": "kernel-default-base-4.12.14-122.74.1.ppc64le",
"product_id": "kernel-default-base-4.12.14-122.74.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.74.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.12.14-122.74.1.ppc64le",
"product_id": "kernel-default-devel-4.12.14-122.74.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.74.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.12.14-122.74.1.ppc64le",
"product_id": "kernel-default-extra-4.12.14-122.74.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"product_id": "kernel-default-kgraft-4.12.14-122.74.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"product_id": "kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.74.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.12.14-122.74.1.ppc64le",
"product_id": "kernel-obs-build-4.12.14-122.74.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.74.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.12.14-122.74.1.ppc64le",
"product_id": "kernel-obs-qa-4.12.14-122.74.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.74.1.ppc64le",
"product": {
"name": "kernel-syms-4.12.14-122.74.1.ppc64le",
"product_id": "kernel-syms-4.12.14-122.74.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.74.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.12.14-122.74.1.ppc64le",
"product_id": "kernel-vanilla-4.12.14-122.74.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.74.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.74.1.ppc64le",
"product_id": "kernel-vanilla-base-4.12.14-122.74.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.74.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.74.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.12.14-122.74.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.74.1.ppc64le",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.74.1.ppc64le",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.74.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.74.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.74.1.ppc64le",
"product_id": "kselftests-kmp-default-4.12.14-122.74.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.12.14-122.74.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"product_id": "cluster-md-kmp-default-4.12.14-122.74.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.74.1.s390x",
"product": {
"name": "dlm-kmp-default-4.12.14-122.74.1.s390x",
"product_id": "dlm-kmp-default-4.12.14-122.74.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.74.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.74.1.s390x",
"product_id": "gfs2-kmp-default-4.12.14-122.74.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.74.1.s390x",
"product": {
"name": "kernel-default-4.12.14-122.74.1.s390x",
"product_id": "kernel-default-4.12.14-122.74.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.74.1.s390x",
"product": {
"name": "kernel-default-base-4.12.14-122.74.1.s390x",
"product_id": "kernel-default-base-4.12.14-122.74.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.74.1.s390x",
"product": {
"name": "kernel-default-devel-4.12.14-122.74.1.s390x",
"product_id": "kernel-default-devel-4.12.14-122.74.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.74.1.s390x",
"product": {
"name": "kernel-default-extra-4.12.14-122.74.1.s390x",
"product_id": "kernel-default-extra-4.12.14-122.74.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.74.1.s390x",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.74.1.s390x",
"product_id": "kernel-default-kgraft-4.12.14-122.74.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"product_id": "kernel-default-kgraft-devel-4.12.14-122.74.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.12.14-122.74.1.s390x",
"product": {
"name": "kernel-default-man-4.12.14-122.74.1.s390x",
"product_id": "kernel-default-man-4.12.14-122.74.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.74.1.s390x",
"product": {
"name": "kernel-obs-build-4.12.14-122.74.1.s390x",
"product_id": "kernel-obs-build-4.12.14-122.74.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.74.1.s390x",
"product": {
"name": "kernel-obs-qa-4.12.14-122.74.1.s390x",
"product_id": "kernel-obs-qa-4.12.14-122.74.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.74.1.s390x",
"product": {
"name": "kernel-syms-4.12.14-122.74.1.s390x",
"product_id": "kernel-syms-4.12.14-122.74.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.74.1.s390x",
"product": {
"name": "kernel-vanilla-4.12.14-122.74.1.s390x",
"product_id": "kernel-vanilla-4.12.14-122.74.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.74.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.74.1.s390x",
"product_id": "kernel-vanilla-base-4.12.14-122.74.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.74.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.74.1.s390x",
"product_id": "kernel-vanilla-devel-4.12.14-122.74.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.74.1.s390x",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.74.1.s390x",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.74.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.12.14-122.74.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.12.14-122.74.1.s390x",
"product_id": "kernel-zfcpdump-4.12.14-122.74.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-man-4.12.14-122.74.1.s390x",
"product": {
"name": "kernel-zfcpdump-man-4.12.14-122.74.1.s390x",
"product_id": "kernel-zfcpdump-man-4.12.14-122.74.1.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"product_id": "kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.74.1.s390x",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.74.1.s390x",
"product_id": "kselftests-kmp-default-4.12.14-122.74.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"product_id": "ocfs2-kmp-default-4.12.14-122.74.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"product_id": "cluster-md-kmp-default-4.12.14-122.74.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.74.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.12.14-122.74.1.x86_64",
"product_id": "dlm-kmp-default-4.12.14-122.74.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"product_id": "gfs2-kmp-default-4.12.14-122.74.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-122.74.1.x86_64",
"product": {
"name": "kernel-debug-4.12.14-122.74.1.x86_64",
"product_id": "kernel-debug-4.12.14-122.74.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-122.74.1.x86_64",
"product": {
"name": "kernel-debug-base-4.12.14-122.74.1.x86_64",
"product_id": "kernel-debug-base-4.12.14-122.74.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-122.74.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.12.14-122.74.1.x86_64",
"product_id": "kernel-debug-devel-4.12.14-122.74.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-devel-4.12.14-122.74.1.x86_64",
"product": {
"name": "kernel-debug-kgraft-devel-4.12.14-122.74.1.x86_64",
"product_id": "kernel-debug-kgraft-devel-4.12.14-122.74.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.74.1.x86_64",
"product": {
"name": "kernel-default-4.12.14-122.74.1.x86_64",
"product_id": "kernel-default-4.12.14-122.74.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.74.1.x86_64",
"product": {
"name": "kernel-default-base-4.12.14-122.74.1.x86_64",
"product_id": "kernel-default-base-4.12.14-122.74.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.74.1.x86_64",
"product": {
"name": "kernel-default-devel-4.12.14-122.74.1.x86_64",
"product_id": "kernel-default-devel-4.12.14-122.74.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.74.1.x86_64",
"product": {
"name": "kernel-default-extra-4.12.14-122.74.1.x86_64",
"product_id": "kernel-default-extra-4.12.14-122.74.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"product_id": "kernel-default-kgraft-4.12.14-122.74.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"product_id": "kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-4.12.14-122.74.1.x86_64",
"product": {
"name": "kernel-kvmsmall-4.12.14-122.74.1.x86_64",
"product_id": "kernel-kvmsmall-4.12.14-122.74.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-122.74.1.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-122.74.1.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-122.74.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-4.12.14-122.74.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-4.12.14-122.74.1.x86_64",
"product_id": "kernel-kvmsmall-devel-4.12.14-122.74.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-kgraft-devel-4.12.14-122.74.1.x86_64",
"product": {
"name": "kernel-kvmsmall-kgraft-devel-4.12.14-122.74.1.x86_64",
"product_id": "kernel-kvmsmall-kgraft-devel-4.12.14-122.74.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.74.1.x86_64",
"product": {
"name": "kernel-obs-build-4.12.14-122.74.1.x86_64",
"product_id": "kernel-obs-build-4.12.14-122.74.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.74.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.12.14-122.74.1.x86_64",
"product_id": "kernel-obs-qa-4.12.14-122.74.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.74.1.x86_64",
"product": {
"name": "kernel-syms-4.12.14-122.74.1.x86_64",
"product_id": "kernel-syms-4.12.14-122.74.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.74.1.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-122.74.1.x86_64",
"product_id": "kernel-vanilla-4.12.14-122.74.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.74.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.74.1.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-122.74.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.74.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.74.1.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-122.74.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.74.1.x86_64",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.74.1.x86_64",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.74.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"product_id": "kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.74.1.x86_64",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.74.1.x86_64",
"product_id": "kselftests-kmp-default-4.12.14-122.74.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"product_id": "ocfs2-kmp-default-4.12.14-122.74.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 12 SP5",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 12 SP5",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-122.74.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-122.74.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-122.74.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-122.74.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-122.74.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x"
},
"product_reference": "dlm-kmp-default-4.12.14-122.74.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-122.74.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.12.14-122.74.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-122.74.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-122.74.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.12.14-122.74.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-122.74.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-122.74.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-122.74.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-122.74.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-122.74.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le"
},
"product_reference": "kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-122.74.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x"
},
"product_reference": "kernel-default-kgraft-4.12.14-122.74.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-122.74.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64"
},
"product_reference": "kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-122.74.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-122.74.2.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch"
},
"product_reference": "kernel-docs-4.12.14-122.74.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-122.74.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-122.74.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-122.74.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-122.74.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-122.74.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x"
},
"product_reference": "kernel-obs-build-4.12.14-122.74.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-122.74.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-122.74.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.74.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-122.74.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.74.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-122.74.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.74.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x"
},
"product_reference": "kernel-default-4.12.14-122.74.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.74.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-122.74.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.74.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-122.74.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.74.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-122.74.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.74.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-122.74.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.74.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-122.74.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.74.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-122.74.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.74.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-122.74.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.74.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-122.74.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.74.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-122.74.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-122.74.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-122.74.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-122.74.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-122.74.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-122.74.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-122.74.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-122.74.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch"
},
"product_reference": "kernel-source-4.12.14-122.74.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.74.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-122.74.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.74.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-122.74.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.74.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-122.74.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.74.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-122.74.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.74.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-122.74.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.74.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-122.74.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.74.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x"
},
"product_reference": "kernel-default-4.12.14-122.74.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.74.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-122.74.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.74.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-122.74.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.74.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-122.74.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.74.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-122.74.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.74.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-122.74.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.74.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-122.74.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.74.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-122.74.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.74.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-122.74.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.74.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-122.74.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-122.74.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-122.74.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-122.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-122.74.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-122.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-122.74.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-122.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch"
},
"product_reference": "kernel-source-4.12.14-122.74.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.74.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-122.74.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.74.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-122.74.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.74.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-122.74.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.74.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-122.74.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-4.12.14-122.74.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP5",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
},
"product_reference": "kernel-default-extra-4.12.14-122.74.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-24586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24586"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24586",
"url": "https://www.suse.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-09T11:55:09Z",
"details": "moderate"
}
],
"title": "CVE-2020-24586"
},
{
"cve": "CVE-2020-24587",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24587"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24587",
"url": "https://www.suse.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1185862 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-09T11:55:09Z",
"details": "moderate"
}
],
"title": "CVE-2020-24587"
},
{
"cve": "CVE-2020-26139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26139"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26139",
"url": "https://www.suse.com/security/cve/CVE-2020-26139"
},
{
"category": "external",
"summary": "SUSE Bug 1186062 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-09T11:55:09Z",
"details": "moderate"
}
],
"title": "CVE-2020-26139"
},
{
"cve": "CVE-2020-26141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26141"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26141",
"url": "https://www.suse.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "SUSE Bug 1185987 for CVE-2020-26141",
"url": "https://bugzilla.suse.com/1185987"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-09T11:55:09Z",
"details": "moderate"
}
],
"title": "CVE-2020-26141"
},
{
"cve": "CVE-2020-26145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26145"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26145",
"url": "https://www.suse.com/security/cve/CVE-2020-26145"
},
{
"category": "external",
"summary": "SUSE Bug 1185860 for CVE-2020-26145",
"url": "https://bugzilla.suse.com/1185860"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-09T11:55:09Z",
"details": "moderate"
}
],
"title": "CVE-2020-26145"
},
{
"cve": "CVE-2020-26147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26147"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26147",
"url": "https://www.suse.com/security/cve/CVE-2020-26147"
},
{
"category": "external",
"summary": "SUSE Bug 1233723 for CVE-2020-26147",
"url": "https://bugzilla.suse.com/1233723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-09T11:55:09Z",
"details": "moderate"
}
],
"title": "CVE-2020-26147"
},
{
"cve": "CVE-2021-23133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23133"
}
],
"notes": [
{
"category": "general",
"text": "A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23133",
"url": "https://www.suse.com/security/cve/CVE-2021-23133"
},
{
"category": "external",
"summary": "SUSE Bug 1184675 for CVE-2021-23133",
"url": "https://bugzilla.suse.com/1184675"
},
{
"category": "external",
"summary": "SUSE Bug 1185901 for CVE-2021-23133",
"url": "https://bugzilla.suse.com/1185901"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-09T11:55:09Z",
"details": "moderate"
}
],
"title": "CVE-2021-23133"
},
{
"cve": "CVE-2021-23134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23134"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23134",
"url": "https://www.suse.com/security/cve/CVE-2021-23134"
},
{
"category": "external",
"summary": "SUSE Bug 1186060 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "external",
"summary": "SUSE Bug 1186061 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "external",
"summary": "SUSE Bug 1220739 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1220739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-09T11:55:09Z",
"details": "important"
}
],
"title": "CVE-2021-23134"
},
{
"cve": "CVE-2021-32399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32399"
}
],
"notes": [
{
"category": "general",
"text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32399",
"url": "https://www.suse.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "SUSE Bug 1184611 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "external",
"summary": "SUSE Bug 1185898 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "external",
"summary": "SUSE Bug 1185899 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-09T11:55:09Z",
"details": "important"
}
],
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-33034",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33034"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33034",
"url": "https://www.suse.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "SUSE Bug 1186111 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "external",
"summary": "SUSE Bug 1186285 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-09T11:55:09Z",
"details": "important"
}
],
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-33200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33200"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-\u003ealu_limit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33200",
"url": "https://www.suse.com/security/cve/CVE-2021-33200"
},
{
"category": "external",
"summary": "SUSE Bug 1186484 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "external",
"summary": "SUSE Bug 1186498 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-09T11:55:09Z",
"details": "important"
}
],
"title": "CVE-2021-33200"
},
{
"cve": "CVE-2021-3491",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3491"
}
],
"notes": [
{
"category": "general",
"text": "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3491",
"url": "https://www.suse.com/security/cve/CVE-2021-3491"
},
{
"category": "external",
"summary": "SUSE Bug 1185642 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "external",
"summary": "SUSE Bug 1187090 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1187090"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-09T11:55:09Z",
"details": "important"
}
],
"title": "CVE-2021-3491"
}
]
}
icsa-21-236-01
Vulnerability from csaf_cisa
Notes
{
"document": {
"acknowledgments": [
{
"organization": "Hitachi ABB Power Grids",
"summary": "reporting these vulnerabilities to CISA"
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov",
"title": "CISA Disclaimer"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "summary",
"text": "Successful exploitation of these vulnerabilities could allow an attacker to direct a client that is connected to a TropOS Wi-Fi access point to fake websites and extract sensitive data.",
"title": "Risk evaluation"
},
{
"category": "other",
"text": "Critical Manufacturing, Energy",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Switzerland",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should:",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\nCISA also provides a section for control systems security recommended practices on the ICS webpage onus-cert.cisa.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on us-cert.cisa.gov in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.\nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
},
{
"category": "other",
"text": "These vulnerabilities are not exploitable remotely. No known public exploits specifically target these vulnerabilities.\n",
"title": "Exploitability"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "ICS Advisory ICSA-21-236-01 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2021/icsa-21-236-01.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-21-236-01 Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-21-236-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/ncas/tips/ST04-014"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/ics/tips/ICS-TIP-12-146-01B"
}
],
"title": "Hitachi ABB Power Grids TropOS",
"tracking": {
"current_release_date": "2021-08-24T00:00:00.000000Z",
"generator": {
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-21-236-01",
"initial_release_date": "2021-08-24T00:00:00.000000Z",
"revision_history": [
{
"date": "2021-08-24T00:00:00.000000Z",
"legacy_version": "Initial",
"number": "1",
"summary": "ICSA-21-236-01 Hitachi ABB Power Grids TropOS"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 8.9.4.8",
"product": {
"name": "TropOS: Firmware Version 8.9.4.8 and prior",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "TropOS"
}
],
"category": "vendor",
"name": "Hitachi Energy"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-24586",
"cwe": {
"id": "CWE-74",
"name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "The 802.11 standard that underpins Wi-Fi protected access (WPA, WPA2, and WPA3) and wired equivalent privacy (WEP) does not require received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this vulnerability can be exploited to inject arbitrary network packets and/or exfiltrate user data.CVE-2020-24586 has been assigned to this vulnerability. A CVSS v3 base score of 3.5 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-24586"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Hitachi ABB Power Grids recommends updating to firmware v8.9.4.9 or later, which resolves these vulnerabilities. For additional information on these vulnerabilities, including update instructions, please see the Hitachi ABB Power Grids security advisory.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK107992A4463\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "vendor_fix",
"details": "Disable the Wi-Fi access on any TropOS unit where local Wi-Fi access is not required. This is achieved by NOT enabling (or disabling) the local access SSID.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Where Wi-Fi access is required, wherever possible ensure physical access to the local area is restricted to approved staff only.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Use the Wi-Fi whitelist capability to restrict Wi-Fi access to only approved personnel.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As the FragAttacks vulnerability is targeted at an end-user device and generally involves redirection to fraudulent websites, the installation of comprehensive firewall capabilities on company end-user devices and servers will significantly reduce the likelihood of negative outcomes.",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2020-24587",
"cwe": {
"id": "CWE-326",
"name": "Inadequate Encryption Strength"
},
"notes": [
{
"category": "summary",
"text": "The 802.11 standard that underpins Wi-Fi protected access (WPA, WPA2, and WPA3) and wired equivalent privacy (WEP) does not require all fragments of a frame are encrypted under the same key. An adversary could exploit this vulnerability to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.CVE-2020-24587 has been assigned to this vulnerability. A CVSS v3 base score of 2.6 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-24587"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Hitachi ABB Power Grids recommends updating to firmware v8.9.4.9 or later, which resolves these vulnerabilities. For additional information on these vulnerabilities, including update instructions, please see the Hitachi ABB Power Grids security advisory.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK107992A4463\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "vendor_fix",
"details": "Disable the Wi-Fi access on any TropOS unit where local Wi-Fi access is not required. This is achieved by NOT enabling (or disabling) the local access SSID.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Where Wi-Fi access is required, wherever possible ensure physical access to the local area is restricted to approved staff only.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Use the Wi-Fi whitelist capability to restrict Wi-Fi access to only approved personnel.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As the FragAttacks vulnerability is targeted at an end-user device and generally involves redirection to fraudulent websites, the installation of comprehensive firewall capabilities on company end-user devices and servers will significantly reduce the likelihood of negative outcomes.",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2020-24588",
"cwe": {
"id": "CWE-306",
"name": "Missing Authentication for Critical Function"
},
"notes": [
{
"category": "summary",
"text": "The 802.11 standard that underpins Wi-Fi protected access (WPA, WPA2, and WPA3) and wired equivalent privacy (WEP) does not require the A-MSDU flag in the plaintext QoS header field be authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary could exploit this vulnerability to inject arbitrary network packets.CVE-2020-24588 has been assigned to this vulnerability. A CVSS v3 base score of 3.5 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-24588"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Hitachi ABB Power Grids recommends updating to firmware v8.9.4.9 or later, which resolves these vulnerabilities. For additional information on these vulnerabilities, including update instructions, please see the Hitachi ABB Power Grids security advisory.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK107992A4463\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "vendor_fix",
"details": "Disable the Wi-Fi access on any TropOS unit where local Wi-Fi access is not required. This is achieved by NOT enabling (or disabling) the local access SSID.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Where Wi-Fi access is required, wherever possible ensure physical access to the local area is restricted to approved staff only.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Use the Wi-Fi whitelist capability to restrict Wi-Fi access to only approved personnel.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As the FragAttacks vulnerability is targeted at an end-user device and generally involves redirection to fraudulent websites, the installation of comprehensive firewall capabilities on company end-user devices and servers will significantly reduce the likelihood of negative outcomes.",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2020-26139",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"notes": [
{
"category": "summary",
"text": "An access point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.CVE-2020-26139 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-26139"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Hitachi ABB Power Grids recommends updating to firmware v8.9.4.9 or later, which resolves these vulnerabilities. For additional information on these vulnerabilities, including update instructions, please see the Hitachi ABB Power Grids security advisory.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK107992A4463\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "vendor_fix",
"details": "Disable the Wi-Fi access on any TropOS unit where local Wi-Fi access is not required. This is achieved by NOT enabling (or disabling) the local access SSID.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Where Wi-Fi access is required, wherever possible ensure physical access to the local area is restricted to approved staff only.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Use the Wi-Fi whitelist capability to restrict Wi-Fi access to only approved personnel.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As the FragAttacks vulnerability is targeted at an end-user device and generally involves redirection to fraudulent websites, the installation of comprehensive firewall capabilities on company end-user devices and servers will significantly reduce the likelihood of negative outcomes.",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2020-26140",
"cwe": {
"id": "CWE-74",
"name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "The WEP, WPA, WPA2, and WPA3 implementations accept plaintext frames in a protected Wi-Fi network. An adversary can exploit this vulnerability to inject arbitrary data frames independent of the network configuration.CVE-2020-26140 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-26140"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Hitachi ABB Power Grids recommends updating to firmware v8.9.4.9 or later, which resolves these vulnerabilities. For additional information on these vulnerabilities, including update instructions, please see the Hitachi ABB Power Grids security advisory.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK107992A4463\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "vendor_fix",
"details": "Disable the Wi-Fi access on any TropOS unit where local Wi-Fi access is not required. This is achieved by NOT enabling (or disabling) the local access SSID.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Where Wi-Fi access is required, wherever possible ensure physical access to the local area is restricted to approved staff only.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Use the Wi-Fi whitelist capability to restrict Wi-Fi access to only approved personnel.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As the FragAttacks vulnerability is targeted at an end-user device and generally involves redirection to fraudulent websites, the installation of comprehensive firewall capabilities on company end-user devices and servers will significantly reduce the likelihood of negative outcomes.",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2020-26141",
"cwe": {
"id": "CWE-354",
"name": "Improper Validation of Integrity Check Value"
},
"notes": [
{
"category": "summary",
"text": "The Wi-Fi implementation does not verify the message integrity check (authenticity) of fragmented TKIP frames. An adversary can exploit this vulnerability to inject and decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.CVE-2020-26141 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-26141"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Hitachi ABB Power Grids recommends updating to firmware v8.9.4.9 or later, which resolves these vulnerabilities. For additional information on these vulnerabilities, including update instructions, please see the Hitachi ABB Power Grids security advisory.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK107992A4463\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "vendor_fix",
"details": "Disable the Wi-Fi access on any TropOS unit where local Wi-Fi access is not required. This is achieved by NOT enabling (or disabling) the local access SSID.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Where Wi-Fi access is required, wherever possible ensure physical access to the local area is restricted to approved staff only.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Use the Wi-Fi whitelist capability to restrict Wi-Fi access to only approved personnel.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As the FragAttacks vulnerability is targeted at an end-user device and generally involves redirection to fraudulent websites, the installation of comprehensive firewall capabilities on company end-user devices and servers will significantly reduce the likelihood of negative outcomes.",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2020-26142",
"cwe": {
"id": "CWE-74",
"name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "The WEP, WPA, WPA2, and WPA3 implementations treat fragmented frames as full frames. An adversary can exploit this vulnerability to inject arbitrary network packets independent of the network configuration.CVE-2020-26142 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-26142"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Hitachi ABB Power Grids recommends updating to firmware v8.9.4.9 or later, which resolves these vulnerabilities. For additional information on these vulnerabilities, including update instructions, please see the Hitachi ABB Power Grids security advisory.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK107992A4463\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "vendor_fix",
"details": "Disable the Wi-Fi access on any TropOS unit where local Wi-Fi access is not required. This is achieved by NOT enabling (or disabling) the local access SSID.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Where Wi-Fi access is required, wherever possible ensure physical access to the local area is restricted to approved staff only.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Use the Wi-Fi whitelist capability to restrict Wi-Fi access to only approved personnel.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As the FragAttacks vulnerability is targeted at an end-user device and generally involves redirection to fraudulent websites, the installation of comprehensive firewall capabilities on company end-user devices and servers will significantly reduce the likelihood of negative outcomes.",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2020-26143",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "The WEP, WPA, WPA2, and WPA3 implementations accept fragmented plaintext frames in a protected Wi-Fi network. An adversary can exploit this vulnerability to inject arbitrary data frames independent of the network configuration.CVE-2020-26143 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-26143"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Hitachi ABB Power Grids recommends updating to firmware v8.9.4.9 or later, which resolves these vulnerabilities. For additional information on these vulnerabilities, including update instructions, please see the Hitachi ABB Power Grids security advisory.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK107992A4463\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "vendor_fix",
"details": "Disable the Wi-Fi access on any TropOS unit where local Wi-Fi access is not required. This is achieved by NOT enabling (or disabling) the local access SSID.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Where Wi-Fi access is required, wherever possible ensure physical access to the local area is restricted to approved staff only.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Use the Wi-Fi whitelist capability to restrict Wi-Fi access to only approved personnel.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As the FragAttacks vulnerability is targeted at an end-user device and generally involves redirection to fraudulent websites, the installation of comprehensive firewall capabilities on company end-user devices and servers will significantly reduce the likelihood of negative outcomes.",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2020-26144",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "The WEP, WPA, WPA2, and WPA3 implementations accept plaintext A-MSDU frames as long as the first eight bytes correspond to a valid RFC1042 (i.e., LLC/SNAP) header for EAPOL. An adversary can exploit this vulnerability to inject arbitrary network packets independent of the network configuration.CVE-2020-26144 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-26144"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Hitachi ABB Power Grids recommends updating to firmware v8.9.4.9 or later, which resolves these vulnerabilities. For additional information on these vulnerabilities, including update instructions, please see the Hitachi ABB Power Grids security advisory.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK107992A4463\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "vendor_fix",
"details": "Disable the Wi-Fi access on any TropOS unit where local Wi-Fi access is not required. This is achieved by NOT enabling (or disabling) the local access SSID.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Where Wi-Fi access is required, wherever possible ensure physical access to the local area is restricted to approved staff only.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Use the Wi-Fi whitelist capability to restrict Wi-Fi access to only approved personnel.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As the FragAttacks vulnerability is targeted at an end-user device and generally involves redirection to fraudulent websites, the installation of comprehensive firewall capabilities on company end-user devices and servers will significantly reduce the likelihood of negative outcomes.",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2020-26145",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments when sent in plaintext and process them as full unfragmented frames. An adversary can exploit this vulnerability to inject arbitrary network packets independent of the network configuration.CVE-2020-26145 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-26145"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Hitachi ABB Power Grids recommends updating to firmware v8.9.4.9 or later, which resolves these vulnerabilities. For additional information on these vulnerabilities, including update instructions, please see the Hitachi ABB Power Grids security advisory.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK107992A4463\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "vendor_fix",
"details": "Disable the Wi-Fi access on any TropOS unit where local Wi-Fi access is not required. This is achieved by NOT enabling (or disabling) the local access SSID.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Where Wi-Fi access is required, wherever possible ensure physical access to the local area is restricted to approved staff only.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Use the Wi-Fi whitelist capability to restrict Wi-Fi access to only approved personnel.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As the FragAttacks vulnerability is targeted at an end-user device and generally involves redirection to fraudulent websites, the installation of comprehensive firewall capabilities on company end-user devices and servers will significantly reduce the likelihood of negative outcomes.",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2020-26146",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "The WPA, WPA2, and WPA3 implementations reassemble fragments with non-consecutive packet numbers. An adversary can exploit this vulnerability to exfiltrate selected fragments. This vulnerability is exploitable when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used. Note: WEP is vulnerable to this attack by design.CVE-2020-26146 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been assigned; the CVSS vector string is (AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-26146"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Hitachi ABB Power Grids recommends updating to firmware v8.9.4.9 or later, which resolves these vulnerabilities. For additional information on these vulnerabilities, including update instructions, please see the Hitachi ABB Power Grids security advisory.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK107992A4463\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "vendor_fix",
"details": "Disable the Wi-Fi access on any TropOS unit where local Wi-Fi access is not required. This is achieved by NOT enabling (or disabling) the local access SSID.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Where Wi-Fi access is required, wherever possible ensure physical access to the local area is restricted to approved staff only.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Use the Wi-Fi whitelist capability to restrict Wi-Fi access to only approved personnel.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As the FragAttacks vulnerability is targeted at an end-user device and generally involves redirection to fraudulent websites, the installation of comprehensive firewall capabilities on company end-user devices and servers will significantly reduce the likelihood of negative outcomes.",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2020-26147",
"cwe": {
"id": "CWE-74",
"name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. An adversary can exploit this vulnerability to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.CVE-2020-26147 has been assigned to this vulnerability. A CVSS v3 base score of 5.4 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-26147"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Hitachi ABB Power Grids recommends updating to firmware v8.9.4.9 or later, which resolves these vulnerabilities. For additional information on these vulnerabilities, including update instructions, please see the Hitachi ABB Power Grids security advisory.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK107992A4463\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "vendor_fix",
"details": "Disable the Wi-Fi access on any TropOS unit where local Wi-Fi access is not required. This is achieved by NOT enabling (or disabling) the local access SSID.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Where Wi-Fi access is required, wherever possible ensure physical access to the local area is restricted to approved staff only.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Use the Wi-Fi whitelist capability to restrict Wi-Fi access to only approved personnel.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As the FragAttacks vulnerability is targeted at an end-user device and generally involves redirection to fraudulent websites, the installation of comprehensive firewall capabilities on company end-user devices and servers will significantly reduce the likelihood of negative outcomes.",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001"
]
}
]
}
]
}
ICSA-21-236-01
Vulnerability from csaf_cisa
Notes
{
"document": {
"acknowledgments": [
{
"organization": "Hitachi ABB Power Grids",
"summary": "reporting these vulnerabilities to CISA"
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov",
"title": "CISA Disclaimer"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "summary",
"text": "Successful exploitation of these vulnerabilities could allow an attacker to direct a client that is connected to a TropOS Wi-Fi access point to fake websites and extract sensitive data.",
"title": "Risk evaluation"
},
{
"category": "other",
"text": "Critical Manufacturing, Energy",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Switzerland",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should:",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\nCISA also provides a section for control systems security recommended practices on the ICS webpage onus-cert.cisa.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on us-cert.cisa.gov in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.\nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
},
{
"category": "other",
"text": "These vulnerabilities are not exploitable remotely. No known public exploits specifically target these vulnerabilities.\n",
"title": "Exploitability"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "ICS Advisory ICSA-21-236-01 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2021/icsa-21-236-01.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-21-236-01 Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-21-236-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/ncas/tips/ST04-014"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/ics/tips/ICS-TIP-12-146-01B"
}
],
"title": "Hitachi ABB Power Grids TropOS",
"tracking": {
"current_release_date": "2021-08-24T00:00:00.000000Z",
"generator": {
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-21-236-01",
"initial_release_date": "2021-08-24T00:00:00.000000Z",
"revision_history": [
{
"date": "2021-08-24T00:00:00.000000Z",
"legacy_version": "Initial",
"number": "1",
"summary": "ICSA-21-236-01 Hitachi ABB Power Grids TropOS"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 8.9.4.8",
"product": {
"name": "TropOS: Firmware Version 8.9.4.8 and prior",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "TropOS"
}
],
"category": "vendor",
"name": "Hitachi Energy"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-24586",
"cwe": {
"id": "CWE-74",
"name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "The 802.11 standard that underpins Wi-Fi protected access (WPA, WPA2, and WPA3) and wired equivalent privacy (WEP) does not require received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this vulnerability can be exploited to inject arbitrary network packets and/or exfiltrate user data.CVE-2020-24586 has been assigned to this vulnerability. A CVSS v3 base score of 3.5 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-24586"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Hitachi ABB Power Grids recommends updating to firmware v8.9.4.9 or later, which resolves these vulnerabilities. For additional information on these vulnerabilities, including update instructions, please see the Hitachi ABB Power Grids security advisory.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK107992A4463\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "vendor_fix",
"details": "Disable the Wi-Fi access on any TropOS unit where local Wi-Fi access is not required. This is achieved by NOT enabling (or disabling) the local access SSID.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Where Wi-Fi access is required, wherever possible ensure physical access to the local area is restricted to approved staff only.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Use the Wi-Fi whitelist capability to restrict Wi-Fi access to only approved personnel.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As the FragAttacks vulnerability is targeted at an end-user device and generally involves redirection to fraudulent websites, the installation of comprehensive firewall capabilities on company end-user devices and servers will significantly reduce the likelihood of negative outcomes.",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2020-24587",
"cwe": {
"id": "CWE-326",
"name": "Inadequate Encryption Strength"
},
"notes": [
{
"category": "summary",
"text": "The 802.11 standard that underpins Wi-Fi protected access (WPA, WPA2, and WPA3) and wired equivalent privacy (WEP) does not require all fragments of a frame are encrypted under the same key. An adversary could exploit this vulnerability to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.CVE-2020-24587 has been assigned to this vulnerability. A CVSS v3 base score of 2.6 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-24587"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Hitachi ABB Power Grids recommends updating to firmware v8.9.4.9 or later, which resolves these vulnerabilities. For additional information on these vulnerabilities, including update instructions, please see the Hitachi ABB Power Grids security advisory.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK107992A4463\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "vendor_fix",
"details": "Disable the Wi-Fi access on any TropOS unit where local Wi-Fi access is not required. This is achieved by NOT enabling (or disabling) the local access SSID.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Where Wi-Fi access is required, wherever possible ensure physical access to the local area is restricted to approved staff only.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Use the Wi-Fi whitelist capability to restrict Wi-Fi access to only approved personnel.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As the FragAttacks vulnerability is targeted at an end-user device and generally involves redirection to fraudulent websites, the installation of comprehensive firewall capabilities on company end-user devices and servers will significantly reduce the likelihood of negative outcomes.",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2020-24588",
"cwe": {
"id": "CWE-306",
"name": "Missing Authentication for Critical Function"
},
"notes": [
{
"category": "summary",
"text": "The 802.11 standard that underpins Wi-Fi protected access (WPA, WPA2, and WPA3) and wired equivalent privacy (WEP) does not require the A-MSDU flag in the plaintext QoS header field be authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary could exploit this vulnerability to inject arbitrary network packets.CVE-2020-24588 has been assigned to this vulnerability. A CVSS v3 base score of 3.5 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-24588"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Hitachi ABB Power Grids recommends updating to firmware v8.9.4.9 or later, which resolves these vulnerabilities. For additional information on these vulnerabilities, including update instructions, please see the Hitachi ABB Power Grids security advisory.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK107992A4463\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "vendor_fix",
"details": "Disable the Wi-Fi access on any TropOS unit where local Wi-Fi access is not required. This is achieved by NOT enabling (or disabling) the local access SSID.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Where Wi-Fi access is required, wherever possible ensure physical access to the local area is restricted to approved staff only.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Use the Wi-Fi whitelist capability to restrict Wi-Fi access to only approved personnel.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As the FragAttacks vulnerability is targeted at an end-user device and generally involves redirection to fraudulent websites, the installation of comprehensive firewall capabilities on company end-user devices and servers will significantly reduce the likelihood of negative outcomes.",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2020-26139",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"notes": [
{
"category": "summary",
"text": "An access point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.CVE-2020-26139 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-26139"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Hitachi ABB Power Grids recommends updating to firmware v8.9.4.9 or later, which resolves these vulnerabilities. For additional information on these vulnerabilities, including update instructions, please see the Hitachi ABB Power Grids security advisory.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK107992A4463\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "vendor_fix",
"details": "Disable the Wi-Fi access on any TropOS unit where local Wi-Fi access is not required. This is achieved by NOT enabling (or disabling) the local access SSID.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Where Wi-Fi access is required, wherever possible ensure physical access to the local area is restricted to approved staff only.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Use the Wi-Fi whitelist capability to restrict Wi-Fi access to only approved personnel.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As the FragAttacks vulnerability is targeted at an end-user device and generally involves redirection to fraudulent websites, the installation of comprehensive firewall capabilities on company end-user devices and servers will significantly reduce the likelihood of negative outcomes.",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2020-26140",
"cwe": {
"id": "CWE-74",
"name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "The WEP, WPA, WPA2, and WPA3 implementations accept plaintext frames in a protected Wi-Fi network. An adversary can exploit this vulnerability to inject arbitrary data frames independent of the network configuration.CVE-2020-26140 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-26140"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Hitachi ABB Power Grids recommends updating to firmware v8.9.4.9 or later, which resolves these vulnerabilities. For additional information on these vulnerabilities, including update instructions, please see the Hitachi ABB Power Grids security advisory.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK107992A4463\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "vendor_fix",
"details": "Disable the Wi-Fi access on any TropOS unit where local Wi-Fi access is not required. This is achieved by NOT enabling (or disabling) the local access SSID.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Where Wi-Fi access is required, wherever possible ensure physical access to the local area is restricted to approved staff only.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Use the Wi-Fi whitelist capability to restrict Wi-Fi access to only approved personnel.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As the FragAttacks vulnerability is targeted at an end-user device and generally involves redirection to fraudulent websites, the installation of comprehensive firewall capabilities on company end-user devices and servers will significantly reduce the likelihood of negative outcomes.",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2020-26141",
"cwe": {
"id": "CWE-354",
"name": "Improper Validation of Integrity Check Value"
},
"notes": [
{
"category": "summary",
"text": "The Wi-Fi implementation does not verify the message integrity check (authenticity) of fragmented TKIP frames. An adversary can exploit this vulnerability to inject and decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.CVE-2020-26141 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-26141"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Hitachi ABB Power Grids recommends updating to firmware v8.9.4.9 or later, which resolves these vulnerabilities. For additional information on these vulnerabilities, including update instructions, please see the Hitachi ABB Power Grids security advisory.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK107992A4463\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "vendor_fix",
"details": "Disable the Wi-Fi access on any TropOS unit where local Wi-Fi access is not required. This is achieved by NOT enabling (or disabling) the local access SSID.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Where Wi-Fi access is required, wherever possible ensure physical access to the local area is restricted to approved staff only.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Use the Wi-Fi whitelist capability to restrict Wi-Fi access to only approved personnel.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As the FragAttacks vulnerability is targeted at an end-user device and generally involves redirection to fraudulent websites, the installation of comprehensive firewall capabilities on company end-user devices and servers will significantly reduce the likelihood of negative outcomes.",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2020-26142",
"cwe": {
"id": "CWE-74",
"name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "The WEP, WPA, WPA2, and WPA3 implementations treat fragmented frames as full frames. An adversary can exploit this vulnerability to inject arbitrary network packets independent of the network configuration.CVE-2020-26142 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-26142"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Hitachi ABB Power Grids recommends updating to firmware v8.9.4.9 or later, which resolves these vulnerabilities. For additional information on these vulnerabilities, including update instructions, please see the Hitachi ABB Power Grids security advisory.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK107992A4463\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "vendor_fix",
"details": "Disable the Wi-Fi access on any TropOS unit where local Wi-Fi access is not required. This is achieved by NOT enabling (or disabling) the local access SSID.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Where Wi-Fi access is required, wherever possible ensure physical access to the local area is restricted to approved staff only.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Use the Wi-Fi whitelist capability to restrict Wi-Fi access to only approved personnel.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As the FragAttacks vulnerability is targeted at an end-user device and generally involves redirection to fraudulent websites, the installation of comprehensive firewall capabilities on company end-user devices and servers will significantly reduce the likelihood of negative outcomes.",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2020-26143",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "The WEP, WPA, WPA2, and WPA3 implementations accept fragmented plaintext frames in a protected Wi-Fi network. An adversary can exploit this vulnerability to inject arbitrary data frames independent of the network configuration.CVE-2020-26143 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-26143"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Hitachi ABB Power Grids recommends updating to firmware v8.9.4.9 or later, which resolves these vulnerabilities. For additional information on these vulnerabilities, including update instructions, please see the Hitachi ABB Power Grids security advisory.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK107992A4463\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "vendor_fix",
"details": "Disable the Wi-Fi access on any TropOS unit where local Wi-Fi access is not required. This is achieved by NOT enabling (or disabling) the local access SSID.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Where Wi-Fi access is required, wherever possible ensure physical access to the local area is restricted to approved staff only.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Use the Wi-Fi whitelist capability to restrict Wi-Fi access to only approved personnel.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As the FragAttacks vulnerability is targeted at an end-user device and generally involves redirection to fraudulent websites, the installation of comprehensive firewall capabilities on company end-user devices and servers will significantly reduce the likelihood of negative outcomes.",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2020-26144",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "The WEP, WPA, WPA2, and WPA3 implementations accept plaintext A-MSDU frames as long as the first eight bytes correspond to a valid RFC1042 (i.e., LLC/SNAP) header for EAPOL. An adversary can exploit this vulnerability to inject arbitrary network packets independent of the network configuration.CVE-2020-26144 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-26144"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Hitachi ABB Power Grids recommends updating to firmware v8.9.4.9 or later, which resolves these vulnerabilities. For additional information on these vulnerabilities, including update instructions, please see the Hitachi ABB Power Grids security advisory.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK107992A4463\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "vendor_fix",
"details": "Disable the Wi-Fi access on any TropOS unit where local Wi-Fi access is not required. This is achieved by NOT enabling (or disabling) the local access SSID.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Where Wi-Fi access is required, wherever possible ensure physical access to the local area is restricted to approved staff only.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Use the Wi-Fi whitelist capability to restrict Wi-Fi access to only approved personnel.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As the FragAttacks vulnerability is targeted at an end-user device and generally involves redirection to fraudulent websites, the installation of comprehensive firewall capabilities on company end-user devices and servers will significantly reduce the likelihood of negative outcomes.",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2020-26145",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments when sent in plaintext and process them as full unfragmented frames. An adversary can exploit this vulnerability to inject arbitrary network packets independent of the network configuration.CVE-2020-26145 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-26145"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Hitachi ABB Power Grids recommends updating to firmware v8.9.4.9 or later, which resolves these vulnerabilities. For additional information on these vulnerabilities, including update instructions, please see the Hitachi ABB Power Grids security advisory.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK107992A4463\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "vendor_fix",
"details": "Disable the Wi-Fi access on any TropOS unit where local Wi-Fi access is not required. This is achieved by NOT enabling (or disabling) the local access SSID.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Where Wi-Fi access is required, wherever possible ensure physical access to the local area is restricted to approved staff only.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Use the Wi-Fi whitelist capability to restrict Wi-Fi access to only approved personnel.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As the FragAttacks vulnerability is targeted at an end-user device and generally involves redirection to fraudulent websites, the installation of comprehensive firewall capabilities on company end-user devices and servers will significantly reduce the likelihood of negative outcomes.",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2020-26146",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "The WPA, WPA2, and WPA3 implementations reassemble fragments with non-consecutive packet numbers. An adversary can exploit this vulnerability to exfiltrate selected fragments. This vulnerability is exploitable when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used. Note: WEP is vulnerable to this attack by design.CVE-2020-26146 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been assigned; the CVSS vector string is (AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-26146"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Hitachi ABB Power Grids recommends updating to firmware v8.9.4.9 or later, which resolves these vulnerabilities. For additional information on these vulnerabilities, including update instructions, please see the Hitachi ABB Power Grids security advisory.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK107992A4463\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "vendor_fix",
"details": "Disable the Wi-Fi access on any TropOS unit where local Wi-Fi access is not required. This is achieved by NOT enabling (or disabling) the local access SSID.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Where Wi-Fi access is required, wherever possible ensure physical access to the local area is restricted to approved staff only.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Use the Wi-Fi whitelist capability to restrict Wi-Fi access to only approved personnel.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As the FragAttacks vulnerability is targeted at an end-user device and generally involves redirection to fraudulent websites, the installation of comprehensive firewall capabilities on company end-user devices and servers will significantly reduce the likelihood of negative outcomes.",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2020-26147",
"cwe": {
"id": "CWE-74",
"name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. An adversary can exploit this vulnerability to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.CVE-2020-26147 has been assigned to this vulnerability. A CVSS v3 base score of 5.4 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-26147"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Hitachi ABB Power Grids recommends updating to firmware v8.9.4.9 or later, which resolves these vulnerabilities. For additional information on these vulnerabilities, including update instructions, please see the Hitachi ABB Power Grids security advisory.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK107992A4463\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "vendor_fix",
"details": "Disable the Wi-Fi access on any TropOS unit where local Wi-Fi access is not required. This is achieved by NOT enabling (or disabling) the local access SSID.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Where Wi-Fi access is required, wherever possible ensure physical access to the local area is restricted to approved staff only.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Use the Wi-Fi whitelist capability to restrict Wi-Fi access to only approved personnel.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "As the FragAttacks vulnerability is targeted at an end-user device and generally involves redirection to fraudulent websites, the installation of comprehensive firewall capabilities on company end-user devices and servers will significantly reduce the likelihood of negative outcomes.",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001"
]
}
]
}
]
}
icsa-22-104-04
Vulnerability from csaf_cisa
Notes
{
"document": {
"acknowledgments": [
{
"organization": "Siemens ProductCERT",
"summary": "reporting these vulnerabilities to CISA."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Twelve vulnerabilities in the implementation of frame aggregation and fragmentation of the 802.11 standard, under the name of \nFragAttacks, have been published.\nSuccessful exploitation of these vulnerabilities could allow an attacker within Wi-Fi range to forge encrypted frames, which could result in sensitive data disclosure and possibly traffic manipulation.\n\nThe advised Siemens products are only affected by some of the published vulnerabilities.\n\nSiemens has released new versions for several affected products and recommends to update to the latest versions. Siemens recommends specific countermeasures for products where fixes are not, or not yet available.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.",
"title": "Terms of Use"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "other",
"text": "This CISA CSAF advisory was converted from Siemens ProductCERT\u0027s CSAF advisory.",
"title": "Advisory Conversion Disclaimer"
},
{
"category": "other",
"text": "Critical Manufacturing, Transportation Systems, Energy, Healthcare and Public Health, Financial Services, Government Services and Facilities",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Germany",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "other",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "SSA-913875: Frame Aggregation and Fragmentation Vulnerabilities in 802.11 - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-913875.json"
},
{
"category": "self",
"summary": "SSA-913875: Frame Aggregation and Fragmentation Vulnerabilities in 802.11 - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-913875.html"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-22-104-04 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2022/icsa-22-104-04.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-22-104-04 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-104-04"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
}
],
"title": "Siemens SCALANCE FragAttacks",
"tracking": {
"current_release_date": "2025-05-06T06:00:00.000000Z",
"generator": {
"date": "2025-04-10T18:40:42.025399Z",
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-22-104-04",
"initial_release_date": "2021-07-13T00:00:00.000000Z",
"revision_history": [
{
"date": "2021-07-13T00:00:00.000000Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
},
{
"date": "2021-10-12T00:00:00.000000Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Added fix for SCALANCE W1750D"
},
{
"date": "2022-02-08T00:00:00.000000Z",
"legacy_version": "1.2",
"number": "3",
"summary": "Added fix for SCALANCE W-700 IEEE 802.11ax family; updated name and split into individual products the SCALANCE W-700 and SCALANCE W-1700 families; clarified that no fix is planned for SCALANCE W-700 IEEE 802.11n and SCALANCE W-1700 IEEE 802.11ac families"
},
{
"date": "2022-04-12T00:00:00.000000Z",
"legacy_version": "1.3",
"number": "4",
"summary": "Added fix for SCALANCE W-1700 IEEE 802.11ac family"
},
{
"date": "2025-04-08T00:00:00.000000Z",
"legacy_version": "1.4",
"number": "5",
"summary": "Clarified fix version information for SCALANCE W-700 IEEE 802.11ax family"
},
{
"date": "2025-05-06T06:00:00.000000Z",
"legacy_version": "Revision",
"number": "6",
"summary": "Revision - Fixing typos"
}
],
"status": "final",
"version": "6"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AA0)",
"product_id": "CSAFPID-0001",
"product_identification_helper": {
"model_numbers": [
"6GK5721-1FC00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AB0)",
"product_id": "CSAFPID-0002",
"product_identification_helper": {
"model_numbers": [
"6GK5721-1FC00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AA0)",
"product_id": "CSAFPID-0003",
"product_identification_helper": {
"model_numbers": [
"6GK5722-1FC00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AB0)",
"product_id": "CSAFPID-0004",
"product_identification_helper": {
"model_numbers": [
"6GK5722-1FC00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AC0)",
"product_id": "CSAFPID-0005",
"product_identification_helper": {
"model_numbers": [
"6GK5722-1FC00-0AC0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AC0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA0)",
"product_id": "CSAFPID-0006",
"product_identification_helper": {
"model_numbers": [
"6GK5734-1FX00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA6)",
"product_id": "CSAFPID-0007",
"product_identification_helper": {
"model_numbers": [
"6GK5734-1FX00-0AA6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AB0)",
"product_id": "CSAFPID-0008",
"product_identification_helper": {
"model_numbers": [
"6GK5734-1FX00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W734-1 RJ45 (USA) (6GK5734-1FX00-0AB6)",
"product_id": "CSAFPID-0009",
"product_identification_helper": {
"model_numbers": [
"6GK5734-1FX00-0AB6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W734-1 RJ45 (USA) (6GK5734-1FX00-0AB6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W738-1 M12 (6GK5738-1GY00-0AA0)",
"product_id": "CSAFPID-0010",
"product_identification_helper": {
"model_numbers": [
"6GK5738-1GY00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W738-1 M12 (6GK5738-1GY00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W738-1 M12 (6GK5738-1GY00-0AB0)",
"product_id": "CSAFPID-0011",
"product_identification_helper": {
"model_numbers": [
"6GK5738-1GY00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W738-1 M12 (6GK5738-1GY00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W748-1 M12 (6GK5748-1GD00-0AA0)",
"product_id": "CSAFPID-0012",
"product_identification_helper": {
"model_numbers": [
"6GK5748-1GD00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W748-1 M12 (6GK5748-1GD00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W748-1 M12 (6GK5748-1GD00-0AB0)",
"product_id": "CSAFPID-0013",
"product_identification_helper": {
"model_numbers": [
"6GK5748-1GD00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W748-1 M12 (6GK5748-1GD00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AA0)",
"product_id": "CSAFPID-0014",
"product_identification_helper": {
"model_numbers": [
"6GK5748-1FC00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AB0)",
"product_id": "CSAFPID-0015",
"product_identification_helper": {
"model_numbers": [
"6GK5748-1FC00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AA0)",
"product_id": "CSAFPID-0016",
"product_identification_helper": {
"model_numbers": [
"6GK5761-1FC00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AB0)",
"product_id": "CSAFPID-0017",
"product_identification_helper": {
"model_numbers": [
"6GK5761-1FC00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TA0)",
"product_id": "CSAFPID-0018",
"product_identification_helper": {
"model_numbers": [
"6GK5774-1FY00-0TA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TB0)",
"product_id": "CSAFPID-0019",
"product_identification_helper": {
"model_numbers": [
"6GK5774-1FY00-0TB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA0)",
"product_id": "CSAFPID-0020",
"product_identification_helper": {
"model_numbers": [
"6GK5774-1FX00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA6)",
"product_id": "CSAFPID-0021",
"product_identification_helper": {
"model_numbers": [
"6GK5774-1FX00-0AA6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AB0)",
"product_id": "CSAFPID-0022",
"product_identification_helper": {
"model_numbers": [
"6GK5774-1FX00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AC0)",
"product_id": "CSAFPID-0023",
"product_identification_helper": {
"model_numbers": [
"6GK5774-1FX00-0AC0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AC0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W774-1 RJ45 (USA) (6GK5774-1FX00-0AB6)",
"product_id": "CSAFPID-0024",
"product_identification_helper": {
"model_numbers": [
"6GK5774-1FX00-0AB6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W774-1 RJ45 (USA) (6GK5774-1FX00-0AB6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W778-1 M12 (6GK5778-1GY00-0AA0)",
"product_id": "CSAFPID-0025",
"product_identification_helper": {
"model_numbers": [
"6GK5778-1GY00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W778-1 M12 (6GK5778-1GY00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W778-1 M12 (6GK5778-1GY00-0AB0)",
"product_id": "CSAFPID-0026",
"product_identification_helper": {
"model_numbers": [
"6GK5778-1GY00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W778-1 M12 (6GK5778-1GY00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W778-1 M12 EEC (6GK5778-1GY00-0TA0)",
"product_id": "CSAFPID-0027",
"product_identification_helper": {
"model_numbers": [
"6GK5778-1GY00-0TA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W778-1 M12 EEC (6GK5778-1GY00-0TA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W778-1 M12 EEC (USA) (6GK5778-1GY00-0TB0)",
"product_id": "CSAFPID-0028",
"product_identification_helper": {
"model_numbers": [
"6GK5778-1GY00-0TB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W778-1 M12 EEC (USA) (6GK5778-1GY00-0TB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AA0)",
"product_id": "CSAFPID-0029",
"product_identification_helper": {
"model_numbers": [
"6GK5786-1FC00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AB0)",
"product_id": "CSAFPID-0030",
"product_identification_helper": {
"model_numbers": [
"6GK5786-1FC00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AA0)",
"product_id": "CSAFPID-0031",
"product_identification_helper": {
"model_numbers": [
"6GK5786-2FC00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AB0)",
"product_id": "CSAFPID-0032",
"product_identification_helper": {
"model_numbers": [
"6GK5786-2FC00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AC0)",
"product_id": "CSAFPID-0033",
"product_identification_helper": {
"model_numbers": [
"6GK5786-2FC00-0AC0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AC0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W786-2 SFP (6GK5786-2FE00-0AA0)",
"product_id": "CSAFPID-0034",
"product_identification_helper": {
"model_numbers": [
"6GK5786-2FE00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W786-2 SFP (6GK5786-2FE00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W786-2 SFP (6GK5786-2FE00-0AB0)",
"product_id": "CSAFPID-0035",
"product_identification_helper": {
"model_numbers": [
"6GK5786-2FE00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W786-2 SFP (6GK5786-2FE00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AA0)",
"product_id": "CSAFPID-0036",
"product_identification_helper": {
"model_numbers": [
"6GK5786-2HC00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AB0)",
"product_id": "CSAFPID-0037",
"product_identification_helper": {
"model_numbers": [
"6GK5786-2HC00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-1 M12 (6GK5788-1GD00-0AA0)",
"product_id": "CSAFPID-0038",
"product_identification_helper": {
"model_numbers": [
"6GK5788-1GD00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-1 M12 (6GK5788-1GD00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-1 M12 (6GK5788-1GD00-0AB0)",
"product_id": "CSAFPID-0039",
"product_identification_helper": {
"model_numbers": [
"6GK5788-1GD00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-1 M12 (6GK5788-1GD00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AA0)",
"product_id": "CSAFPID-0040",
"product_identification_helper": {
"model_numbers": [
"6GK5788-1FC00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AB0)",
"product_id": "CSAFPID-0041",
"product_identification_helper": {
"model_numbers": [
"6GK5788-1FC00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-2 M12 (6GK5788-2GD00-0AA0)",
"product_id": "CSAFPID-0042",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2GD00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-2 M12 (6GK5788-2GD00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-2 M12 (6GK5788-2GD00-0AB0)",
"product_id": "CSAFPID-0043",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2GD00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-2 M12 (6GK5788-2GD00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TA0)",
"product_id": "CSAFPID-0044",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2GD00-0TA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TB0)",
"product_id": "CSAFPID-0045",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2GD00-0TB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TC0)",
"product_id": "CSAFPID-0046",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2GD00-0TC0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TC0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AA0)",
"product_id": "CSAFPID-0047",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2FC00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AB0)",
"product_id": "CSAFPID-0048",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2FC00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AC0)",
"product_id": "CSAFPID-0049",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2FC00-0AC0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AC0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV3.0.0",
"product": {
"name": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0AA0)",
"product_id": "CSAFPID-0050",
"product_identification_helper": {
"model_numbers": [
"6GK5748-1GY01-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV3.0.0",
"product": {
"name": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0TA0)",
"product_id": "CSAFPID-0051",
"product_identification_helper": {
"model_numbers": [
"6GK5748-1GY01-0TA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0TA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV8.7.1.3",
"product": {
"name": "SCALANCE W1750D (JP) (6GK5750-2HX01-1AD0)",
"product_id": "CSAFPID-0052",
"product_identification_helper": {
"model_numbers": [
"6GK5750-2HX01-1AD0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W1750D (JP) (6GK5750-2HX01-1AD0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV8.7.1.3",
"product": {
"name": "SCALANCE W1750D (ROW) (6GK5750-2HX01-1AA0)",
"product_id": "CSAFPID-0053",
"product_identification_helper": {
"model_numbers": [
"6GK5750-2HX01-1AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W1750D (ROW) (6GK5750-2HX01-1AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV8.7.1.3",
"product": {
"name": "SCALANCE W1750D (USA) (6GK5750-2HX01-1AB0)",
"product_id": "CSAFPID-0054",
"product_identification_helper": {
"model_numbers": [
"6GK5750-2HX01-1AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W1750D (USA) (6GK5750-2HX01-1AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV3.0.0",
"product": {
"name": "SCALANCE W1788-1 M12 (6GK5788-1GY01-0AA0)",
"product_id": "CSAFPID-0055",
"product_identification_helper": {
"model_numbers": [
"6GK5788-1GY01-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W1788-1 M12 (6GK5788-1GY01-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV3.0.0",
"product": {
"name": "SCALANCE W1788-2 EEC M12 (6GK5788-2GY01-0TA0)",
"product_id": "CSAFPID-0056",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2GY01-0TA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W1788-2 EEC M12 (6GK5788-2GY01-0TA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV3.0.0",
"product": {
"name": "SCALANCE W1788-2 M12 (6GK5788-2GY01-0AA0)",
"product_id": "CSAFPID-0057",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2GY01-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W1788-2 M12 (6GK5788-2GY01-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV3.0.0",
"product": {
"name": "SCALANCE W1788-2IA M12 (6GK5788-2HY01-0AA0)",
"product_id": "CSAFPID-0058",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2HY01-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W1788-2IA M12 (6GK5788-2HY01-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV1.2.0",
"product": {
"name": "SCALANCE WAM763-1 (6GK5763-1AL00-7DA0)",
"product_id": "CSAFPID-0059",
"product_identification_helper": {
"model_numbers": [
"6GK5763-1AL00-7DA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WAM763-1 (6GK5763-1AL00-7DA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV1.2.0",
"product": {
"name": "SCALANCE WAM766-1 (6GK5766-1GE00-7DA0)",
"product_id": "CSAFPID-0060",
"product_identification_helper": {
"model_numbers": [
"6GK5766-1GE00-7DA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WAM766-1 (6GK5766-1GE00-7DA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV1.2.0",
"product": {
"name": "SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0)",
"product_id": "CSAFPID-0061",
"product_identification_helper": {
"model_numbers": [
"6GK5766-1GE00-7DB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV1.2.0",
"product": {
"name": "SCALANCE WAM766-1 EEC (6GK5766-1GE00-7TA0)",
"product_id": "CSAFPID-0062",
"product_identification_helper": {
"model_numbers": [
"6GK5766-1GE00-7TA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WAM766-1 EEC (6GK5766-1GE00-7TA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV1.2.0",
"product": {
"name": "SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0)",
"product_id": "CSAFPID-0063",
"product_identification_helper": {
"model_numbers": [
"6GK5766-1GE00-7TB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV1.2.0",
"product": {
"name": "SCALANCE WUM763-1 (6GK5763-1AL00-3AA0)",
"product_id": "CSAFPID-0064",
"product_identification_helper": {
"model_numbers": [
"6GK5763-1AL00-3AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WUM763-1 (6GK5763-1AL00-3AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV1.2.0",
"product": {
"name": "SCALANCE WUM763-1 (6GK5763-1AL00-3DA0)",
"product_id": "CSAFPID-0065",
"product_identification_helper": {
"model_numbers": [
"6GK5763-1AL00-3DA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WUM763-1 (6GK5763-1AL00-3DA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV1.2.0",
"product": {
"name": "SCALANCE WUM766-1 (6GK5766-1GE00-3DA0)",
"product_id": "CSAFPID-0066",
"product_identification_helper": {
"model_numbers": [
"6GK5766-1GE00-3DA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WUM766-1 (6GK5766-1GE00-3DA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV1.2.0",
"product": {
"name": "SCALANCE WUM766-1 (USA) (6GK5766-1GE00-3DB0)",
"product_id": "CSAFPID-0067",
"product_identification_helper": {
"model_numbers": [
"6GK5766-1GE00-3DB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WUM766-1 (USA) (6GK5766-1GE00-3DB0)"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-24588",
"cwe": {
"id": "CWE-306",
"name": "Missing Authentication for Critical Function"
},
"notes": [
{
"category": "summary",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0050",
"CSAFPID-0051",
"CSAFPID-0052",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058",
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049",
"CSAFPID-0059",
"CSAFPID-0060",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0064",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Disable A-MSDU, if possible",
"product_ids": [
"CSAFPID-0050",
"CSAFPID-0051",
"CSAFPID-0052",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058",
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049",
"CSAFPID-0059",
"CSAFPID-0060",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0064",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067"
]
},
{
"category": "mitigation",
"details": "As these vulnerabilities can only be exploited within Wi-Fi range, when possible reduce Wi-Fi transmission power or make sure to have the devices in private areas with physical access controls",
"product_ids": [
"CSAFPID-0050",
"CSAFPID-0051",
"CSAFPID-0052",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058",
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049",
"CSAFPID-0059",
"CSAFPID-0060",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0064",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067"
]
},
{
"category": "no_fix_planned",
"details": "Currently no fix is planned",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049"
]
},
{
"category": "vendor_fix",
"details": "Update to V1.2.0 or later version",
"product_ids": [
"CSAFPID-0059",
"CSAFPID-0060",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0064",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109805887/"
},
{
"category": "vendor_fix",
"details": "Update to V3.0.0 or later version",
"product_ids": [
"CSAFPID-0050",
"CSAFPID-0051",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109808629/"
},
{
"category": "vendor_fix",
"details": "Update to V8.7.1.3 or later version",
"product_ids": [
"CSAFPID-0052",
"CSAFPID-0053",
"CSAFPID-0054"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109802805/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0050",
"CSAFPID-0051",
"CSAFPID-0052",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058",
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049",
"CSAFPID-0059",
"CSAFPID-0060",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0064",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067"
]
}
],
"title": "CVE-2020-24588"
},
{
"cve": "CVE-2020-26139",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0050",
"CSAFPID-0051",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058",
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049",
"CSAFPID-0059",
"CSAFPID-0060",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0064",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067"
]
},
"remediations": [
{
"category": "mitigation",
"details": "As these vulnerabilities can only be exploited within Wi-Fi range, when possible reduce Wi-Fi transmission power or make sure to have the devices in private areas with physical access controls",
"product_ids": [
"CSAFPID-0050",
"CSAFPID-0051",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058",
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049",
"CSAFPID-0059",
"CSAFPID-0060",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0064",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067"
]
},
{
"category": "no_fix_planned",
"details": "Currently no fix is planned",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049"
]
},
{
"category": "vendor_fix",
"details": "Update to V1.2.0 or later version",
"product_ids": [
"CSAFPID-0059",
"CSAFPID-0060",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0064",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109805887/"
},
{
"category": "vendor_fix",
"details": "Update to V3.0.0 or later version",
"product_ids": [
"CSAFPID-0050",
"CSAFPID-0051",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109808629/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0050",
"CSAFPID-0051",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058",
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049",
"CSAFPID-0059",
"CSAFPID-0060",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0064",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067"
]
}
],
"title": "CVE-2020-26139"
},
{
"cve": "CVE-2020-26140",
"cwe": {
"id": "CWE-74",
"name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext frames in a protected Wi-Fi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049"
]
},
"remediations": [
{
"category": "mitigation",
"details": "As these vulnerabilities can only be exploited within Wi-Fi range, when possible reduce Wi-Fi transmission power or make sure to have the devices in private areas with physical access controls",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049"
]
},
{
"category": "no_fix_planned",
"details": "Currently no fix is planned",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049"
]
}
],
"title": "CVE-2020-26140"
},
{
"cve": "CVE-2020-26141",
"cwe": {
"id": "CWE-354",
"name": "Improper Validation of Integrity Check Value"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049"
]
},
"remediations": [
{
"category": "mitigation",
"details": "As these vulnerabilities can only be exploited within Wi-Fi range, when possible reduce Wi-Fi transmission power or make sure to have the devices in private areas with physical access controls",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049"
]
},
{
"category": "no_fix_planned",
"details": "Currently no fix is planned",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049"
]
}
],
"title": "CVE-2020-26141"
},
{
"cve": "CVE-2020-26143",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the ALFA Windows 10 driver 1030.36.604 for AWUS036ACH. The WEP, WPA, WPA2, and WPA3 implementations accept fragmented plaintext frames in a protected Wi-Fi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049"
]
},
"remediations": [
{
"category": "mitigation",
"details": "As these vulnerabilities can only be exploited within Wi-Fi range, when possible reduce Wi-Fi transmission power or make sure to have the devices in private areas with physical access controls",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049"
]
},
{
"category": "no_fix_planned",
"details": "Currently no fix is planned",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049"
]
}
],
"title": "CVE-2020-26143"
},
{
"cve": "CVE-2020-26144",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext A-MSDU frames as long as the first 8 bytes correspond to a valid RFC1042 (i.e., LLC/SNAP) header for EAPOL. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049",
"CSAFPID-0059",
"CSAFPID-0060",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0064",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Disable A-MSDU, if possible",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049",
"CSAFPID-0059",
"CSAFPID-0060",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0064",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067"
]
},
{
"category": "mitigation",
"details": "As these vulnerabilities can only be exploited within Wi-Fi range, when possible reduce Wi-Fi transmission power or make sure to have the devices in private areas with physical access controls",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049",
"CSAFPID-0059",
"CSAFPID-0060",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0064",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067"
]
},
{
"category": "no_fix_planned",
"details": "Currently no fix is planned",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049"
]
},
{
"category": "vendor_fix",
"details": "Update to V1.2.0 or later version",
"product_ids": [
"CSAFPID-0059",
"CSAFPID-0060",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0064",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109805887/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049",
"CSAFPID-0059",
"CSAFPID-0060",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0064",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067"
]
}
],
"title": "CVE-2020-26144"
},
{
"cve": "CVE-2020-26145",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0059",
"CSAFPID-0060",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0064",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067"
]
},
"remediations": [
{
"category": "mitigation",
"details": "As these vulnerabilities can only be exploited within Wi-Fi range, when possible reduce Wi-Fi transmission power or make sure to have the devices in private areas with physical access controls",
"product_ids": [
"CSAFPID-0059",
"CSAFPID-0060",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0064",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067"
]
},
{
"category": "vendor_fix",
"details": "Update to V1.2.0 or later version",
"product_ids": [
"CSAFPID-0059",
"CSAFPID-0060",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0064",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109805887/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0059",
"CSAFPID-0060",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0064",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067"
]
}
],
"title": "CVE-2020-26145"
},
{
"cve": "CVE-2020-26146",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WPA, WPA2, and WPA3 implementations reassemble fragments with non-consecutive packet numbers. An adversary can abuse this to exfiltrate selected fragments. This vulnerability is exploitable when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used. Note that WEP is vulnerable to this attack by design.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0050",
"CSAFPID-0051",
"CSAFPID-0052",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058",
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049",
"CSAFPID-0059",
"CSAFPID-0060",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0064",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067"
]
},
"remediations": [
{
"category": "mitigation",
"details": "As these vulnerabilities can only be exploited within Wi-Fi range, when possible reduce Wi-Fi transmission power or make sure to have the devices in private areas with physical access controls",
"product_ids": [
"CSAFPID-0050",
"CSAFPID-0051",
"CSAFPID-0052",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058",
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049",
"CSAFPID-0059",
"CSAFPID-0060",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0064",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067"
]
},
{
"category": "no_fix_planned",
"details": "Currently no fix is planned",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049"
]
},
{
"category": "vendor_fix",
"details": "Update to V1.2.0 or later version",
"product_ids": [
"CSAFPID-0059",
"CSAFPID-0060",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0064",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109805887/"
},
{
"category": "vendor_fix",
"details": "Update to V3.0.0 or later version",
"product_ids": [
"CSAFPID-0050",
"CSAFPID-0051",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109808629/"
},
{
"category": "vendor_fix",
"details": "Update to V8.7.1.3 or later version",
"product_ids": [
"CSAFPID-0052",
"CSAFPID-0053",
"CSAFPID-0054"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109802805/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0050",
"CSAFPID-0051",
"CSAFPID-0052",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058",
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049",
"CSAFPID-0059",
"CSAFPID-0060",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0064",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067"
]
}
],
"title": "CVE-2020-26146"
},
{
"cve": "CVE-2020-26147",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0050",
"CSAFPID-0051",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058",
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049"
]
},
"remediations": [
{
"category": "mitigation",
"details": "As these vulnerabilities can only be exploited within Wi-Fi range, when possible reduce Wi-Fi transmission power or make sure to have the devices in private areas with physical access controls",
"product_ids": [
"CSAFPID-0050",
"CSAFPID-0051",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058",
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049"
]
},
{
"category": "no_fix_planned",
"details": "Currently no fix is planned",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049"
]
},
{
"category": "vendor_fix",
"details": "Update to V3.0.0 or later version",
"product_ids": [
"CSAFPID-0050",
"CSAFPID-0051",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109808629/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0050",
"CSAFPID-0051",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058",
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049"
]
}
],
"title": "CVE-2020-26147"
}
]
}
ICSA-22-104-04
Vulnerability from csaf_cisa
Notes
{
"document": {
"acknowledgments": [
{
"organization": "Siemens ProductCERT",
"summary": "reporting these vulnerabilities to CISA."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Twelve vulnerabilities in the implementation of frame aggregation and fragmentation of the 802.11 standard, under the name of \nFragAttacks, have been published.\nSuccessful exploitation of these vulnerabilities could allow an attacker within Wi-Fi range to forge encrypted frames, which could result in sensitive data disclosure and possibly traffic manipulation.\n\nThe advised Siemens products are only affected by some of the published vulnerabilities.\n\nSiemens has released new versions for several affected products and recommends to update to the latest versions. Siemens recommends specific countermeasures for products where fixes are not, or not yet available.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.",
"title": "Terms of Use"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "other",
"text": "This CISA CSAF advisory was converted from Siemens ProductCERT\u0027s CSAF advisory.",
"title": "Advisory Conversion Disclaimer"
},
{
"category": "other",
"text": "Critical Manufacturing, Transportation Systems, Energy, Healthcare and Public Health, Financial Services, Government Services and Facilities",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Germany",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "other",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "SSA-913875: Frame Aggregation and Fragmentation Vulnerabilities in 802.11 - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-913875.json"
},
{
"category": "self",
"summary": "SSA-913875: Frame Aggregation and Fragmentation Vulnerabilities in 802.11 - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-913875.html"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-22-104-04 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2022/icsa-22-104-04.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-22-104-04 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-104-04"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
}
],
"title": "Siemens SCALANCE FragAttacks",
"tracking": {
"current_release_date": "2025-05-06T06:00:00.000000Z",
"generator": {
"date": "2025-04-10T18:40:42.025399Z",
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-22-104-04",
"initial_release_date": "2021-07-13T00:00:00.000000Z",
"revision_history": [
{
"date": "2021-07-13T00:00:00.000000Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
},
{
"date": "2021-10-12T00:00:00.000000Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Added fix for SCALANCE W1750D"
},
{
"date": "2022-02-08T00:00:00.000000Z",
"legacy_version": "1.2",
"number": "3",
"summary": "Added fix for SCALANCE W-700 IEEE 802.11ax family; updated name and split into individual products the SCALANCE W-700 and SCALANCE W-1700 families; clarified that no fix is planned for SCALANCE W-700 IEEE 802.11n and SCALANCE W-1700 IEEE 802.11ac families"
},
{
"date": "2022-04-12T00:00:00.000000Z",
"legacy_version": "1.3",
"number": "4",
"summary": "Added fix for SCALANCE W-1700 IEEE 802.11ac family"
},
{
"date": "2025-04-08T00:00:00.000000Z",
"legacy_version": "1.4",
"number": "5",
"summary": "Clarified fix version information for SCALANCE W-700 IEEE 802.11ax family"
},
{
"date": "2025-05-06T06:00:00.000000Z",
"legacy_version": "Revision",
"number": "6",
"summary": "Revision - Fixing typos"
}
],
"status": "final",
"version": "6"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AA0)",
"product_id": "CSAFPID-0001",
"product_identification_helper": {
"model_numbers": [
"6GK5721-1FC00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AB0)",
"product_id": "CSAFPID-0002",
"product_identification_helper": {
"model_numbers": [
"6GK5721-1FC00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AA0)",
"product_id": "CSAFPID-0003",
"product_identification_helper": {
"model_numbers": [
"6GK5722-1FC00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AB0)",
"product_id": "CSAFPID-0004",
"product_identification_helper": {
"model_numbers": [
"6GK5722-1FC00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AC0)",
"product_id": "CSAFPID-0005",
"product_identification_helper": {
"model_numbers": [
"6GK5722-1FC00-0AC0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AC0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA0)",
"product_id": "CSAFPID-0006",
"product_identification_helper": {
"model_numbers": [
"6GK5734-1FX00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA6)",
"product_id": "CSAFPID-0007",
"product_identification_helper": {
"model_numbers": [
"6GK5734-1FX00-0AA6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AB0)",
"product_id": "CSAFPID-0008",
"product_identification_helper": {
"model_numbers": [
"6GK5734-1FX00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W734-1 RJ45 (USA) (6GK5734-1FX00-0AB6)",
"product_id": "CSAFPID-0009",
"product_identification_helper": {
"model_numbers": [
"6GK5734-1FX00-0AB6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W734-1 RJ45 (USA) (6GK5734-1FX00-0AB6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W738-1 M12 (6GK5738-1GY00-0AA0)",
"product_id": "CSAFPID-0010",
"product_identification_helper": {
"model_numbers": [
"6GK5738-1GY00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W738-1 M12 (6GK5738-1GY00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W738-1 M12 (6GK5738-1GY00-0AB0)",
"product_id": "CSAFPID-0011",
"product_identification_helper": {
"model_numbers": [
"6GK5738-1GY00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W738-1 M12 (6GK5738-1GY00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W748-1 M12 (6GK5748-1GD00-0AA0)",
"product_id": "CSAFPID-0012",
"product_identification_helper": {
"model_numbers": [
"6GK5748-1GD00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W748-1 M12 (6GK5748-1GD00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W748-1 M12 (6GK5748-1GD00-0AB0)",
"product_id": "CSAFPID-0013",
"product_identification_helper": {
"model_numbers": [
"6GK5748-1GD00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W748-1 M12 (6GK5748-1GD00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AA0)",
"product_id": "CSAFPID-0014",
"product_identification_helper": {
"model_numbers": [
"6GK5748-1FC00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AB0)",
"product_id": "CSAFPID-0015",
"product_identification_helper": {
"model_numbers": [
"6GK5748-1FC00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AA0)",
"product_id": "CSAFPID-0016",
"product_identification_helper": {
"model_numbers": [
"6GK5761-1FC00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AB0)",
"product_id": "CSAFPID-0017",
"product_identification_helper": {
"model_numbers": [
"6GK5761-1FC00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TA0)",
"product_id": "CSAFPID-0018",
"product_identification_helper": {
"model_numbers": [
"6GK5774-1FY00-0TA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TB0)",
"product_id": "CSAFPID-0019",
"product_identification_helper": {
"model_numbers": [
"6GK5774-1FY00-0TB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA0)",
"product_id": "CSAFPID-0020",
"product_identification_helper": {
"model_numbers": [
"6GK5774-1FX00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA6)",
"product_id": "CSAFPID-0021",
"product_identification_helper": {
"model_numbers": [
"6GK5774-1FX00-0AA6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AB0)",
"product_id": "CSAFPID-0022",
"product_identification_helper": {
"model_numbers": [
"6GK5774-1FX00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AC0)",
"product_id": "CSAFPID-0023",
"product_identification_helper": {
"model_numbers": [
"6GK5774-1FX00-0AC0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AC0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W774-1 RJ45 (USA) (6GK5774-1FX00-0AB6)",
"product_id": "CSAFPID-0024",
"product_identification_helper": {
"model_numbers": [
"6GK5774-1FX00-0AB6"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W774-1 RJ45 (USA) (6GK5774-1FX00-0AB6)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W778-1 M12 (6GK5778-1GY00-0AA0)",
"product_id": "CSAFPID-0025",
"product_identification_helper": {
"model_numbers": [
"6GK5778-1GY00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W778-1 M12 (6GK5778-1GY00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W778-1 M12 (6GK5778-1GY00-0AB0)",
"product_id": "CSAFPID-0026",
"product_identification_helper": {
"model_numbers": [
"6GK5778-1GY00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W778-1 M12 (6GK5778-1GY00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W778-1 M12 EEC (6GK5778-1GY00-0TA0)",
"product_id": "CSAFPID-0027",
"product_identification_helper": {
"model_numbers": [
"6GK5778-1GY00-0TA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W778-1 M12 EEC (6GK5778-1GY00-0TA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W778-1 M12 EEC (USA) (6GK5778-1GY00-0TB0)",
"product_id": "CSAFPID-0028",
"product_identification_helper": {
"model_numbers": [
"6GK5778-1GY00-0TB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W778-1 M12 EEC (USA) (6GK5778-1GY00-0TB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AA0)",
"product_id": "CSAFPID-0029",
"product_identification_helper": {
"model_numbers": [
"6GK5786-1FC00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AB0)",
"product_id": "CSAFPID-0030",
"product_identification_helper": {
"model_numbers": [
"6GK5786-1FC00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AA0)",
"product_id": "CSAFPID-0031",
"product_identification_helper": {
"model_numbers": [
"6GK5786-2FC00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AB0)",
"product_id": "CSAFPID-0032",
"product_identification_helper": {
"model_numbers": [
"6GK5786-2FC00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AC0)",
"product_id": "CSAFPID-0033",
"product_identification_helper": {
"model_numbers": [
"6GK5786-2FC00-0AC0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AC0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W786-2 SFP (6GK5786-2FE00-0AA0)",
"product_id": "CSAFPID-0034",
"product_identification_helper": {
"model_numbers": [
"6GK5786-2FE00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W786-2 SFP (6GK5786-2FE00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W786-2 SFP (6GK5786-2FE00-0AB0)",
"product_id": "CSAFPID-0035",
"product_identification_helper": {
"model_numbers": [
"6GK5786-2FE00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W786-2 SFP (6GK5786-2FE00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AA0)",
"product_id": "CSAFPID-0036",
"product_identification_helper": {
"model_numbers": [
"6GK5786-2HC00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AB0)",
"product_id": "CSAFPID-0037",
"product_identification_helper": {
"model_numbers": [
"6GK5786-2HC00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-1 M12 (6GK5788-1GD00-0AA0)",
"product_id": "CSAFPID-0038",
"product_identification_helper": {
"model_numbers": [
"6GK5788-1GD00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-1 M12 (6GK5788-1GD00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-1 M12 (6GK5788-1GD00-0AB0)",
"product_id": "CSAFPID-0039",
"product_identification_helper": {
"model_numbers": [
"6GK5788-1GD00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-1 M12 (6GK5788-1GD00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AA0)",
"product_id": "CSAFPID-0040",
"product_identification_helper": {
"model_numbers": [
"6GK5788-1FC00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AB0)",
"product_id": "CSAFPID-0041",
"product_identification_helper": {
"model_numbers": [
"6GK5788-1FC00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-2 M12 (6GK5788-2GD00-0AA0)",
"product_id": "CSAFPID-0042",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2GD00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-2 M12 (6GK5788-2GD00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-2 M12 (6GK5788-2GD00-0AB0)",
"product_id": "CSAFPID-0043",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2GD00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-2 M12 (6GK5788-2GD00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TA0)",
"product_id": "CSAFPID-0044",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2GD00-0TA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TB0)",
"product_id": "CSAFPID-0045",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2GD00-0TB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TC0)",
"product_id": "CSAFPID-0046",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2GD00-0TC0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TC0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AA0)",
"product_id": "CSAFPID-0047",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2FC00-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AB0)",
"product_id": "CSAFPID-0048",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2FC00-0AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AC0)",
"product_id": "CSAFPID-0049",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2FC00-0AC0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AC0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV3.0.0",
"product": {
"name": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0AA0)",
"product_id": "CSAFPID-0050",
"product_identification_helper": {
"model_numbers": [
"6GK5748-1GY01-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV3.0.0",
"product": {
"name": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0TA0)",
"product_id": "CSAFPID-0051",
"product_identification_helper": {
"model_numbers": [
"6GK5748-1GY01-0TA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0TA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV8.7.1.3",
"product": {
"name": "SCALANCE W1750D (JP) (6GK5750-2HX01-1AD0)",
"product_id": "CSAFPID-0052",
"product_identification_helper": {
"model_numbers": [
"6GK5750-2HX01-1AD0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W1750D (JP) (6GK5750-2HX01-1AD0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV8.7.1.3",
"product": {
"name": "SCALANCE W1750D (ROW) (6GK5750-2HX01-1AA0)",
"product_id": "CSAFPID-0053",
"product_identification_helper": {
"model_numbers": [
"6GK5750-2HX01-1AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W1750D (ROW) (6GK5750-2HX01-1AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV8.7.1.3",
"product": {
"name": "SCALANCE W1750D (USA) (6GK5750-2HX01-1AB0)",
"product_id": "CSAFPID-0054",
"product_identification_helper": {
"model_numbers": [
"6GK5750-2HX01-1AB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W1750D (USA) (6GK5750-2HX01-1AB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV3.0.0",
"product": {
"name": "SCALANCE W1788-1 M12 (6GK5788-1GY01-0AA0)",
"product_id": "CSAFPID-0055",
"product_identification_helper": {
"model_numbers": [
"6GK5788-1GY01-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W1788-1 M12 (6GK5788-1GY01-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV3.0.0",
"product": {
"name": "SCALANCE W1788-2 EEC M12 (6GK5788-2GY01-0TA0)",
"product_id": "CSAFPID-0056",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2GY01-0TA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W1788-2 EEC M12 (6GK5788-2GY01-0TA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV3.0.0",
"product": {
"name": "SCALANCE W1788-2 M12 (6GK5788-2GY01-0AA0)",
"product_id": "CSAFPID-0057",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2GY01-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W1788-2 M12 (6GK5788-2GY01-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV3.0.0",
"product": {
"name": "SCALANCE W1788-2IA M12 (6GK5788-2HY01-0AA0)",
"product_id": "CSAFPID-0058",
"product_identification_helper": {
"model_numbers": [
"6GK5788-2HY01-0AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE W1788-2IA M12 (6GK5788-2HY01-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV1.2.0",
"product": {
"name": "SCALANCE WAM763-1 (6GK5763-1AL00-7DA0)",
"product_id": "CSAFPID-0059",
"product_identification_helper": {
"model_numbers": [
"6GK5763-1AL00-7DA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WAM763-1 (6GK5763-1AL00-7DA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV1.2.0",
"product": {
"name": "SCALANCE WAM766-1 (6GK5766-1GE00-7DA0)",
"product_id": "CSAFPID-0060",
"product_identification_helper": {
"model_numbers": [
"6GK5766-1GE00-7DA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WAM766-1 (6GK5766-1GE00-7DA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV1.2.0",
"product": {
"name": "SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0)",
"product_id": "CSAFPID-0061",
"product_identification_helper": {
"model_numbers": [
"6GK5766-1GE00-7DB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV1.2.0",
"product": {
"name": "SCALANCE WAM766-1 EEC (6GK5766-1GE00-7TA0)",
"product_id": "CSAFPID-0062",
"product_identification_helper": {
"model_numbers": [
"6GK5766-1GE00-7TA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WAM766-1 EEC (6GK5766-1GE00-7TA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV1.2.0",
"product": {
"name": "SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0)",
"product_id": "CSAFPID-0063",
"product_identification_helper": {
"model_numbers": [
"6GK5766-1GE00-7TB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV1.2.0",
"product": {
"name": "SCALANCE WUM763-1 (6GK5763-1AL00-3AA0)",
"product_id": "CSAFPID-0064",
"product_identification_helper": {
"model_numbers": [
"6GK5763-1AL00-3AA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WUM763-1 (6GK5763-1AL00-3AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV1.2.0",
"product": {
"name": "SCALANCE WUM763-1 (6GK5763-1AL00-3DA0)",
"product_id": "CSAFPID-0065",
"product_identification_helper": {
"model_numbers": [
"6GK5763-1AL00-3DA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WUM763-1 (6GK5763-1AL00-3DA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV1.2.0",
"product": {
"name": "SCALANCE WUM766-1 (6GK5766-1GE00-3DA0)",
"product_id": "CSAFPID-0066",
"product_identification_helper": {
"model_numbers": [
"6GK5766-1GE00-3DA0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WUM766-1 (6GK5766-1GE00-3DA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV1.2.0",
"product": {
"name": "SCALANCE WUM766-1 (USA) (6GK5766-1GE00-3DB0)",
"product_id": "CSAFPID-0067",
"product_identification_helper": {
"model_numbers": [
"6GK5766-1GE00-3DB0"
]
}
}
}
],
"category": "product_name",
"name": "SCALANCE WUM766-1 (USA) (6GK5766-1GE00-3DB0)"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-24588",
"cwe": {
"id": "CWE-306",
"name": "Missing Authentication for Critical Function"
},
"notes": [
{
"category": "summary",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0050",
"CSAFPID-0051",
"CSAFPID-0052",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058",
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049",
"CSAFPID-0059",
"CSAFPID-0060",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0064",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Disable A-MSDU, if possible",
"product_ids": [
"CSAFPID-0050",
"CSAFPID-0051",
"CSAFPID-0052",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058",
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049",
"CSAFPID-0059",
"CSAFPID-0060",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0064",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067"
]
},
{
"category": "mitigation",
"details": "As these vulnerabilities can only be exploited within Wi-Fi range, when possible reduce Wi-Fi transmission power or make sure to have the devices in private areas with physical access controls",
"product_ids": [
"CSAFPID-0050",
"CSAFPID-0051",
"CSAFPID-0052",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058",
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049",
"CSAFPID-0059",
"CSAFPID-0060",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0064",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067"
]
},
{
"category": "no_fix_planned",
"details": "Currently no fix is planned",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049"
]
},
{
"category": "vendor_fix",
"details": "Update to V1.2.0 or later version",
"product_ids": [
"CSAFPID-0059",
"CSAFPID-0060",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0064",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109805887/"
},
{
"category": "vendor_fix",
"details": "Update to V3.0.0 or later version",
"product_ids": [
"CSAFPID-0050",
"CSAFPID-0051",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109808629/"
},
{
"category": "vendor_fix",
"details": "Update to V8.7.1.3 or later version",
"product_ids": [
"CSAFPID-0052",
"CSAFPID-0053",
"CSAFPID-0054"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109802805/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0050",
"CSAFPID-0051",
"CSAFPID-0052",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058",
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049",
"CSAFPID-0059",
"CSAFPID-0060",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0064",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067"
]
}
],
"title": "CVE-2020-24588"
},
{
"cve": "CVE-2020-26139",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0050",
"CSAFPID-0051",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058",
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049",
"CSAFPID-0059",
"CSAFPID-0060",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0064",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067"
]
},
"remediations": [
{
"category": "mitigation",
"details": "As these vulnerabilities can only be exploited within Wi-Fi range, when possible reduce Wi-Fi transmission power or make sure to have the devices in private areas with physical access controls",
"product_ids": [
"CSAFPID-0050",
"CSAFPID-0051",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058",
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049",
"CSAFPID-0059",
"CSAFPID-0060",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0064",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067"
]
},
{
"category": "no_fix_planned",
"details": "Currently no fix is planned",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049"
]
},
{
"category": "vendor_fix",
"details": "Update to V1.2.0 or later version",
"product_ids": [
"CSAFPID-0059",
"CSAFPID-0060",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0064",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109805887/"
},
{
"category": "vendor_fix",
"details": "Update to V3.0.0 or later version",
"product_ids": [
"CSAFPID-0050",
"CSAFPID-0051",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109808629/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0050",
"CSAFPID-0051",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058",
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049",
"CSAFPID-0059",
"CSAFPID-0060",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0064",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067"
]
}
],
"title": "CVE-2020-26139"
},
{
"cve": "CVE-2020-26140",
"cwe": {
"id": "CWE-74",
"name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext frames in a protected Wi-Fi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049"
]
},
"remediations": [
{
"category": "mitigation",
"details": "As these vulnerabilities can only be exploited within Wi-Fi range, when possible reduce Wi-Fi transmission power or make sure to have the devices in private areas with physical access controls",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049"
]
},
{
"category": "no_fix_planned",
"details": "Currently no fix is planned",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049"
]
}
],
"title": "CVE-2020-26140"
},
{
"cve": "CVE-2020-26141",
"cwe": {
"id": "CWE-354",
"name": "Improper Validation of Integrity Check Value"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049"
]
},
"remediations": [
{
"category": "mitigation",
"details": "As these vulnerabilities can only be exploited within Wi-Fi range, when possible reduce Wi-Fi transmission power or make sure to have the devices in private areas with physical access controls",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049"
]
},
{
"category": "no_fix_planned",
"details": "Currently no fix is planned",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049"
]
}
],
"title": "CVE-2020-26141"
},
{
"cve": "CVE-2020-26143",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the ALFA Windows 10 driver 1030.36.604 for AWUS036ACH. The WEP, WPA, WPA2, and WPA3 implementations accept fragmented plaintext frames in a protected Wi-Fi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049"
]
},
"remediations": [
{
"category": "mitigation",
"details": "As these vulnerabilities can only be exploited within Wi-Fi range, when possible reduce Wi-Fi transmission power or make sure to have the devices in private areas with physical access controls",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049"
]
},
{
"category": "no_fix_planned",
"details": "Currently no fix is planned",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049"
]
}
],
"title": "CVE-2020-26143"
},
{
"cve": "CVE-2020-26144",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext A-MSDU frames as long as the first 8 bytes correspond to a valid RFC1042 (i.e., LLC/SNAP) header for EAPOL. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049",
"CSAFPID-0059",
"CSAFPID-0060",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0064",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Disable A-MSDU, if possible",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049",
"CSAFPID-0059",
"CSAFPID-0060",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0064",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067"
]
},
{
"category": "mitigation",
"details": "As these vulnerabilities can only be exploited within Wi-Fi range, when possible reduce Wi-Fi transmission power or make sure to have the devices in private areas with physical access controls",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049",
"CSAFPID-0059",
"CSAFPID-0060",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0064",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067"
]
},
{
"category": "no_fix_planned",
"details": "Currently no fix is planned",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049"
]
},
{
"category": "vendor_fix",
"details": "Update to V1.2.0 or later version",
"product_ids": [
"CSAFPID-0059",
"CSAFPID-0060",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0064",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109805887/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049",
"CSAFPID-0059",
"CSAFPID-0060",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0064",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067"
]
}
],
"title": "CVE-2020-26144"
},
{
"cve": "CVE-2020-26145",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0059",
"CSAFPID-0060",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0064",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067"
]
},
"remediations": [
{
"category": "mitigation",
"details": "As these vulnerabilities can only be exploited within Wi-Fi range, when possible reduce Wi-Fi transmission power or make sure to have the devices in private areas with physical access controls",
"product_ids": [
"CSAFPID-0059",
"CSAFPID-0060",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0064",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067"
]
},
{
"category": "vendor_fix",
"details": "Update to V1.2.0 or later version",
"product_ids": [
"CSAFPID-0059",
"CSAFPID-0060",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0064",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109805887/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0059",
"CSAFPID-0060",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0064",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067"
]
}
],
"title": "CVE-2020-26145"
},
{
"cve": "CVE-2020-26146",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WPA, WPA2, and WPA3 implementations reassemble fragments with non-consecutive packet numbers. An adversary can abuse this to exfiltrate selected fragments. This vulnerability is exploitable when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used. Note that WEP is vulnerable to this attack by design.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0050",
"CSAFPID-0051",
"CSAFPID-0052",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058",
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049",
"CSAFPID-0059",
"CSAFPID-0060",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0064",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067"
]
},
"remediations": [
{
"category": "mitigation",
"details": "As these vulnerabilities can only be exploited within Wi-Fi range, when possible reduce Wi-Fi transmission power or make sure to have the devices in private areas with physical access controls",
"product_ids": [
"CSAFPID-0050",
"CSAFPID-0051",
"CSAFPID-0052",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058",
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049",
"CSAFPID-0059",
"CSAFPID-0060",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0064",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067"
]
},
{
"category": "no_fix_planned",
"details": "Currently no fix is planned",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049"
]
},
{
"category": "vendor_fix",
"details": "Update to V1.2.0 or later version",
"product_ids": [
"CSAFPID-0059",
"CSAFPID-0060",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0064",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109805887/"
},
{
"category": "vendor_fix",
"details": "Update to V3.0.0 or later version",
"product_ids": [
"CSAFPID-0050",
"CSAFPID-0051",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109808629/"
},
{
"category": "vendor_fix",
"details": "Update to V8.7.1.3 or later version",
"product_ids": [
"CSAFPID-0052",
"CSAFPID-0053",
"CSAFPID-0054"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109802805/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0050",
"CSAFPID-0051",
"CSAFPID-0052",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058",
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049",
"CSAFPID-0059",
"CSAFPID-0060",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0064",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067"
]
}
],
"title": "CVE-2020-26146"
},
{
"cve": "CVE-2020-26147",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0050",
"CSAFPID-0051",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058",
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049"
]
},
"remediations": [
{
"category": "mitigation",
"details": "As these vulnerabilities can only be exploited within Wi-Fi range, when possible reduce Wi-Fi transmission power or make sure to have the devices in private areas with physical access controls",
"product_ids": [
"CSAFPID-0050",
"CSAFPID-0051",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058",
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049"
]
},
{
"category": "no_fix_planned",
"details": "Currently no fix is planned",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049"
]
},
{
"category": "vendor_fix",
"details": "Update to V3.0.0 or later version",
"product_ids": [
"CSAFPID-0050",
"CSAFPID-0051",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109808629/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0050",
"CSAFPID-0051",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058",
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0012",
"CSAFPID-0013",
"CSAFPID-0014",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0022",
"CSAFPID-0023",
"CSAFPID-0024",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0046",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049"
]
}
],
"title": "CVE-2020-26147"
}
]
}
opensuse-su-2021:0843-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The openSUSE Leap 15.2 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-33200: Enforcing incorrect limits for pointer arithmetic operations by the BPF verifier could be abused to perform out-of-bounds reads and writes in kernel memory (bsc#1186484).\n- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values. (bsc#1186111)\n- CVE-2020-26139: Fixed a denial-of-service when an Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. (bnc#1186062)\n- CVE-2021-23134: A Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges. (bnc#1186060)\n- CVE-2021-3491: Fixed a potential heap overflow in mem_rw(). This vulnerability is related to the PROVIDE_BUFFERS operation, which allowed the MAX_RW_COUNT limit to be bypassed (bsc#1185642).\n- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).\n- CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances this can be abused to inject arbitrary network packets and/or exfiltrate user data (bnc#1185859).\n- CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed (bnc#1185859 bnc#1185862).\n- CVE-2020-24588: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets. (bnc#1185861)\n- CVE-2020-26147: The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments, even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used (bnc#1185859).\n- CVE-2020-26145: An issue was discovered with Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration. (bnc#1185860)\n- CVE-2020-26141: An issue was discovered in the ALFA driver for AWUS036H, where the Message Integrity Check (authenticity) of fragmented TKIP frames was not verified. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bnc#1185987)\n\nThe following non-security bugs were fixed:\n\n- ACPI / hotplug / PCI: Fix reference count leak in enable_slot() (git-fixes).\n- ACPI: GTDT: Do not corrupt interrupt mappings on watchdow probe failure (git-fixes).\n- ACPI: custom_method: fix a possible memory leak (git-fixes).\n- ACPI: custom_method: fix potential use-after-free issue (git-fixes).\n- ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro (git-fixes).\n- ALSA: bebob: enable to deliver MIDI messages for multiple ports (git-fixes).\n- ALSA: dice: fix stream format at middle sampling rate for Alesis iO 26 (git-fixes).\n- ALSA: dice: fix stream format for TC Electronic Konnekt Live at high sampling transfer frequency (git-fixes).\n- ALSA: firewire-lib: fix calculation for size of IR context payload (git-fixes).\n- ALSA: firewire-lib: fix check for the size of isochronous packet payload (git-fixes).\n- ALSA: hda/conexant: Re-order CX5066 quirk table entries (git-fixes).\n- ALSA: hda/realtek: ALC285 Thinkpad jack pin quirk is unreachable (git-fixes).\n- ALSA: hda/realtek: Add some CLOVE SSIDs of ALC293 (git-fixes).\n- ALSA: hda/realtek: Headphone volume is controlled by Front mixer (git-fixes).\n- ALSA: hda/realtek: reset eapd coeff to default value for alc287 (git-fixes).\n- ALSA: hda: fixup headset for ASUS GU502 laptop (git-fixes).\n- ALSA: hda: generic: change the DAC ctl name for LO+SPK or LO+HP (git-fixes).\n- ALSA: hdsp: do not disable if not enabled (git-fixes).\n- ALSA: hdspm: do not disable if not enabled (git-fixes).\n- ALSA: intel8x0: Do not update period unless prepared (git-fixes).\n- ALSA: line6: Fix racy initialization of LINE6 MIDI (git-fixes).\n- ALSA: rme9652: do not disable if not enabled (git-fixes).\n- ALSA: usb-audio: Validate MS endpoint descriptors (git-fixes).\n- ALSA: usb-audio: fix control-request direction (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix device hang with ehci-pci (git-fixes).\n- ALSA: usb-audio: scarlett2: Improve driver startup messages (git-fixes).\n- ALSA: usb-audio: scarlett2: snd_scarlett_gen2_controls_create() can be static (git-fixes).\n- ARM64: vdso32: Install vdso32 from vdso_install (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for the Chuwi Hi8 tablet (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Enable jack-detect support on Asus T100TAF (git-fixes).\n- ASoC: cs35l33: fix an error code in probe() (git-fixes).\n- ASoC: cs42l42: Regmap must use_single_read/write (git-fixes).\n- ASoC: rsnd: call rsnd_ssi_master_clk_start() from rsnd_ssi_init() (git-fixes).\n- ASoC: rsnd: core: Check convert rate in rsnd_hw_params (git-fixes).\n- ASoC: rt286: Generalize support for ALC3263 codec (git-fixes).\n- ASoC: rt286: Make RT286_SET_GPIO_* readable and writable (git-fixes).\n- Bluetooth: L2CAP: Fix handling LE modes by L2CAP_OPTIONS (git-fixes).\n- Bluetooth: SMP: Fail if remote and local public keys are identical (git-fixes).\n- Bluetooth: Set CONF_NOT_COMPLETE as l2cap_chan default (git-fixes).\n- Bluetooth: check for zapped sk before connecting (git-fixes).\n- Bluetooth: initialize skb_queue_head at l2cap_chan_create() (git-fixes).\n- Drivers: hv: vmbus: Fix Suspend-to-Idle for Generation-2 VM (git-fixes).\n- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185725).\n- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185725).\n- Drivers: hv: vmbus: Use after free in __vmbus_open() (git-fixes).\n- Input: elants_i2c - do not bind to i2c-hid compatible ACPI instantiated devices (git-fixes).\n- Input: silead - add workaround for x86 BIOS-es which bring the chip up in a stuck state (git-fixes).\n- KVM: s390: fix guarded storage control register handling (bsc#1133021).\n- Move upstreamed media fixes into sorted section\n- NFC: nci: fix memory leak in nci_allocate_device (git-fixes).\n- PCI/RCEC: Fix RCiEP device to RCEC association (git-fixes).\n- PCI: Allow VPD access for QLogic ISP2722 (git-fixes).\n- PCI: PM: Do not read power state in pci_enable_device_flags() (git-fixes).\n- PCI: Release OF node in pci_scan_device()\u0027s error path (git-fixes).\n- PCI: endpoint: Fix missing destroy_workqueue() (git-fixes).\n- PCI: iproc: Fix return value of iproc_msi_irq_domain_alloc() (git-fixes).\n- PCI: thunder: Fix compile testing (git-fixes).\n- PM / devfreq: Use more accurate returned new_freq as resume_freq (git-fixes).\n- RDMA/addr: create addr_wq with WQ_MEM_RECLAIM flag (bsc#1183346).\n- RDMA/core: create ib_cm with WQ_MEM_RECLAIM flag (bsc#1183346).\n- RDMA/hns: Delete redundant abnormal interrupt status (git-fixes).\n- RDMA/hns: Delete redundant condition judgment related to eq (git-fixes).\n- RDMA/qedr: Fix error return code in qedr_iw_connect() (jsc#SLE-8215).\n- RDMA/srpt: Fix error return code in srpt_cm_req_recv() (git-fixes).\n- Revert \u0027arm64: vdso: Fix compilation with clang older than 8\u0027 (git-fixes).\n- Revert \u0027gdrom: fix a memory leak bug\u0027 (git-fixes).\n- Revert \u0027i3c master: fix missing destroy_workqueue() on error in i3c_master_register\u0027 (git-fixes).\n- Revert \u0027leds: lp5523: fix a missing check of return value of lp55xx_read\u0027 (git-fixes).\n- Revert 337f13046ff0 (\u0027futex: Allow FUTEX_CLOCK_REALTIME with FUTEX_WAIT op\u0027) (git-fixes).\n- SUNRPC in case of backlog, hand free slots directly to waiting task (bsc#1185428).\n- SUNRPC: More fixes for backlog congestion (bsc#1185428).\n- USB: Add LPM quirk for Lenovo ThinkPad USB-C Dock Gen2 Ethernet (git-fixes).\n- USB: Add reset-resume quirk for WD19\u0027s Realtek Hub (git-fixes).\n- USB: serial: pl2303: add support for PL2303HXN (bsc#1186320).\n- USB: serial: pl2303: fix line-speed handling on newer chips (bsc#1186320).\n- USB: serial: ti_usb_3410_5052: fix TIOCSSERIAL permission check (git-fixes).\n- USB: trancevibrator: fix control-request direction (git-fixes).\n- amdgpu: avoid incorrect %hu format string (git-fixes).\n- arm64/mm: Fix pfn_valid() for ZONE_DEVICE based memory (git-fixes).\n- arm64: Add missing ISB after invalidating TLB in __primary_switch (git-fixes).\n- arm64: avoid -Woverride-init warning (git-fixes).\n- arm64: kasan: fix page_alloc tagging with DEBUG_VIRTUAL (git-fixes).\n- arm64: kdump: update ppos when reading elfcorehdr (git-fixes).\n- arm64: kexec_file: fix memory leakage in create_dtb() when fdt_open_into() fails (git-fixes).\n- arm64: link with -z norelro for LLD or aarch64-elf (git-fixes).\n- arm64: link with -z norelro regardless of CONFIG_RELOCATABLE (git-fixes).\n- arm64: ptrace: Fix seccomp of traced syscall -1 (NO_SYSCALL) (git-fixes).\n- arm64: ptrace: Use NO_SYSCALL instead of -1 in syscall_trace_enter() (git-fixes).\n- arm64: vdso32: make vdso32 install conditional (git-fixes).\n- arm: mm: use __pfn_to_section() to get mem_section (git-fixes).\n- ata: ahci: Disable SXS for Hisilicon Kunpeng920 (git-fixes).\n- blk-iocost: ioc_pd_free() shouldn\u0027t assume irq disabled (git-fixes).\n- blk-mq: Swap two calls in blk_mq_exit_queue() (git-fixes).\n- block/genhd: use atomic_t for disk_event-\u003eblock (bsc#1185497).\n- block: Fix three kernel-doc warnings (git-fixes).\n- block: fix get_max_io_size() (git-fixes).\n- bnxt_en: Fix RX consumer index logic in the error path (git-fixes).\n- bnxt_en: fix ternary sign extension bug in bnxt_show_temp() (git-fixes).\n- bpf: Fix leakage of uninitialized bpf stack under speculation (bsc#1155518).\n- bpf: Fix masking negation logic upon negative dst register (bsc#1155518).\n- btrfs: fix race between transaction aborts and fsyncs leading to use-after-free (bsc#1186441).\n- btrfs: fix race when picking most recent mod log operation for an old root (bsc#1186439).\n- cdc-wdm: untangle a circular dependency between callback and softint (git-fixes).\n- cdrom: gdrom: deallocate struct gdrom_unit fields in remove_gdrom (git-fixes).\n- cdrom: gdrom: initialize global variable at init time (git-fixes).\n- ceph: do not clobber i_snap_caps on non-I_NEW inode (bsc#1186501).\n- ceph: fix inode leak on getattr error in __fh_to_dentry (bsc#1186501).\n- ceph: fix up error handling with snapdirs (bsc#1186501).\n- ceph: only check pool permissions for regular files (bsc#1186501).\n- cfg80211: scan: drop entry from hidden_list on overflow (git-fixes).\n- clk: socfpga: arria10: Fix memory leak of socfpga_clk on error return (git-fixes).\n- cpufreq: intel_pstate: Add Icelake servers support in no-HWP mode (bsc#1185758).\n- crypto: api - check for ERR pointers in crypto_destroy_tfm() (git-fixes).\n- crypto: mips/poly1305 - enable for all MIPS processors (git-fixes).\n- crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init (git-fixes).\n- crypto: qat - Fix a double free in adf_create_ring (git-fixes).\n- crypto: qat - do not release uninitialized resources (git-fixes).\n- crypto: qat - fix error path in adf_isr_resource_alloc() (git-fixes).\n- crypto: qat - fix unmap invalid dma address (git-fixes).\n- crypto: stm32/cryp - Fix PM reference leak on stm32-cryp.c (git-fixes).\n- crypto: stm32/hash - Fix PM reference leak on stm32-hash.c (git-fixes).\n- cxgb4: Fix unintentional sign extension issues (git-fixes).\n- dm: avoid filesystem lookup in dm_get_dev_t() (git-fixes).\n- dmaengine: dw-edma: Fix crash on loading/unloading driver (git-fixes).\n- docs: kernel-parameters: Add gpio_mockup_named_lines (git-fixes).\n- docs: kernel-parameters: Move gpio-mockup for alphabetic order (git-fixes).\n- drivers: hv: Fix whitespace errors (bsc#1185725).\n- drm/amd/display: Fix UBSAN warning for not a valid value for type \u0027_Bool\u0027 (git-fixes).\n- drm/amd/display: Fix two cursor duplication when using overlay (git-fixes).\n- drm/amd/display: Force vsync flip when reconfiguring MPCC (git-fixes).\n- drm/amd/display: Reject non-zero src_y and src_x for video planes (git-fixes).\n- drm/amd/display: fix dml prefetch validation (git-fixes).\n- drm/amd/display: fixed divide by zero kernel crash during dsc enablement (git-fixes).\n- drm/amdgpu : Fix asic reset regression issue introduce by 8f211fe8ac7c4f (git-fixes).\n- drm/amdgpu: disable 3DCGCG on picasso/raven1 to avoid compute hang (git-fixes).\n- drm/amdgpu: fix NULL pointer dereference (git-fixes).\n- drm/amdgpu: mask the xgmi number of hops reported from psp to kfd (git-fixes).\n- drm/amdkfd: Fix cat debugfs hang_hws file causes system crash bug (git-fixes).\n- drm/i915: Avoid div-by-zero on gen2 (git-fixes).\n- drm/meson: fix shutdown crash when component not probed (git-fixes).\n- drm/msm/mdp5: Configure PP_SYNC_HEIGHT to double the vtotal (git-fixes).\n- drm/msm/mdp5: Do not multiply vclk line count by 100 (git-fixes).\n- drm/radeon/dpm: Disable sclk switching on Oland when two 4K 60Hz monitors are connected (git-fixes).\n- drm/radeon: Avoid power table parsing memory leaks (git-fixes).\n- drm/radeon: Fix off-by-one power_state index heap overwrite (git-fixes).\n- drm/vkms: fix misuse of WARN_ON (git-fixes).\n- drm: Added orientation quirk for OneGX1 Pro (git-fixes).\n- ethernet:enic: Fix a use after free bug in enic_hard_start_xmit (git-fixes).\n- extcon: arizona: Fix some issues when HPDET IRQ fires after the jack has been unplugged (git-fixes).\n- extcon: arizona: Fix various races on driver unbind (git-fixes).\n- fbdev: zero-fill colormap in fbcmap.c (git-fixes).\n- firmware: arm_scpi: Prevent the ternary sign expansion bug (git-fixes).\n- fs/epoll: restore waking from ep_done_scan() (bsc#1183868).\n- ftrace: Handle commands when closing set_ftrace_filter file (git-fixes).\n- futex: Change utime parameter to be \u0027const ... *\u0027 (git-fixes).\n- futex: Do not apply time namespace adjustment on FUTEX_LOCK_PI (bsc#1164648).\n- futex: Get rid of the val2 conditional dance (git-fixes).\n- futex: Make syscall entry points less convoluted (git-fixes).\n- genirq/irqdomain: Do not try to free an interrupt that has no (git-fixes)\n- genirq: Disable interrupts for force threaded handlers (git-fixes)\n- genirq: Reduce irqdebug cacheline bouncing (bsc#1185703 ltc#192641).\n- gpio: xilinx: Correct kernel doc for xgpio_probe() (git-fixes).\n- gpiolib: acpi: Add quirk to ignore EC wakeups on Dell Venue 10 Pro 5055 (git-fixes).\n- hrtimer: Update softirq_expires_next correctly after (git-fixes)\n- hwmon: (occ) Fix poll rate limiting (git-fixes).\n- i2c: Add I2C_AQ_NO_REP_START adapter quirk (git-fixes).\n- i2c: bail out early when RDWR parameters are wrong (git-fixes).\n- i2c: i801: Do not generate an interrupt on bus reset (git-fixes).\n- i2c: s3c2410: fix possible NULL pointer deref on read message after write (git-fixes).\n- i2c: sh_mobile: Use new clock calculation formulas for RZ/G2E (git-fixes).\n- i40e: Fix PHY type identifiers for 2.5G and 5G adapters (git-fixes).\n- i40e: Fix use-after-free in i40e_client_subtask() (git-fixes).\n- i40e: fix broken XDP support (git-fixes).\n- i40e: fix the restart auto-negotiation after FEC modified (git-fixes).\n- ibmvfc: Avoid move login if fast fail is enabled (bsc#1185938 ltc#192043).\n- ibmvfc: Handle move login failure (bsc#1185938 ltc#192043).\n- ibmvfc: Reinit target retries (bsc#1185938 ltc#192043).\n- ibmvnic: remove default label from to_string switch (bsc#1152457 ltc#174432 git-fixes).\n- ics932s401: fix broken handling of errors when word reading fails (git-fixes).\n- iio: adc: ad7124: Fix missbalanced regulator enable / disable on error (git-fixes).\n- iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers (git-fixes).\n- iio: adc: ad7768-1: Fix too small buffer passed to iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: ad7793: Add missing error code in ad7793_setup() (git-fixes).\n- iio: gyro: fxas21002c: balance runtime power in error path (git-fixes).\n- iio: gyro: mpu3050: Fix reported temperature value (git-fixes).\n- iio: proximity: pulsedlight: Fix rumtime PM imbalance on error (git-fixes).\n- iio: tsl2583: Fix division by a zero lux_val (git-fixes).\n- intel_th: Consistency and off-by-one fix (git-fixes).\n- iommu/amd: Add support for map/unmap_resource (jsc#ECO-3482).\n- ipc/mqueue, msg, sem: Avoid relying on a stack reference past its expiry (bsc#1185988).\n- ipmi/watchdog: Stop watchdog timer when the current action is \u0027none\u0027 (bsc#1184855).\n- kernel-docs.spec.in: Build using an utf-8 locale. Sphinx cannot handle UTF-8 input in non-UTF-8 locale.\n- leds: lp5523: check return value of lp5xx_read and jump to cleanup code (git-fixes).\n- lpfc: Decouple port_template and vport_template (bsc#185032).\n- mac80211: clear the beacon\u0027s CRC after channel switch (git-fixes).\n- md-cluster: fix use-after-free issue when removing rdev (bsc#1184082).\n- md/raid1: properly indicate failure when ending a failed write request (bsc#1185680).\n- md: do not flush workqueue unconditionally in md_open (bsc#1184081).\n- md: factor out a mddev_find_locked helper from mddev_find (bsc#1184081).\n- md: md_open returns -EBUSY when entering racing area (bsc#1184081).\n- md: split mddev_find (bsc#1184081).\n- media: adv7604: fix possible use-after-free in adv76xx_remove() (git-fixes).\n- media: drivers: media: pci: sta2x11: fix Kconfig dependency on GPIOLIB (git-fixes).\n- media: dvb-usb: fix memory leak in dvb_usb_adapter_init (git-fixes).\n- media: em28xx: fix memory leak (git-fixes).\n- media: gspca/sq905.c: fix uninitialized variable (git-fixes).\n- media: i2c: adv7511-v4l2: fix possible use-after-free in adv7511_remove() (git-fixes).\n- media: i2c: adv7842: fix possible use-after-free in adv7842_remove() (git-fixes).\n- media: i2c: tda1997: Fix possible use-after-free in tda1997x_remove() (git-fixes).\n- media: imx: capture: Return -EPIPE from __capture_legacy_try_fmt() (git-fixes).\n- media: ite-cir: check for receive overflow (git-fixes).\n- media: media/saa7164: fix saa7164_encoder_register() memory leak bugs (git-fixes).\n- media: platform: sti: Fix runtime PM imbalance in regs_show (git-fixes).\n- media: tc358743: fix possible use-after-free in tc358743_remove() (git-fixes).\n- mfd: arizona: Fix rumtime PM imbalance on error (git-fixes).\n- misc/uss720: fix memory leak in uss720_probe (git-fixes).\n- mlxsw: spectrum_mr: Update egress RIF list before route\u0027s action (git-fixes).\n- mmc: block: Update ext_csd.cache_ctrl if it was written (git-fixes).\n- mmc: core: Do a power cycle when the CMD11 fails (git-fixes).\n- mmc: core: Set read only for SD cards with permanent write protect bit (git-fixes).\n- mmc: sdhci-pci-gli: increase 1.8V regulator wait (git-fixes).\n- mmc: sdhci-pci: Add PCI IDs for Intel LKF (git-fixes).\n- mmc: sdhci-pci: Fix initialization of some SD cards for Intel BYT-based controllers (git-fixes).\n- mmc: sdhci: Check for reset prior to DMA address unmap (git-fixes).\n- net, xdp: Update pkt_type if generic XDP changes unicast MAC (git-fixes).\n- net: enetc: fix link error again (git-fixes).\n- net: hns3: Fix for geneve tx checksum bug (git-fixes).\n- net: hns3: add check for HNS3_NIC_STATE_INITED in hns3_reset_notify_up_enet() (git-fixes).\n- net: hns3: clear unnecessary reset request in hclge_reset_rebuild (git-fixes).\n- net: hns3: disable phy loopback setting in hclge_mac_start_phy (git-fixes).\n- net: hns3: fix for vxlan gpe tx checksum bug (git-fixes).\n- net: hns3: fix incorrect configuration for igu_egu_hw_err (git-fixes).\n- net: hns3: initialize the message content in hclge_get_link_mode() (git-fixes).\n- net: hns3: use netif_tx_disable to stop the transmit queue (git-fixes).\n- net: thunderx: Fix unintentional sign extension issue (git-fixes).\n- net: usb: fix memory leak in smsc75xx_bind (git-fixes).\n- netdevice: Add missing IFF_PHONY_HEADROOM self-definition (git-fixes).\n- netfilter: conntrack: add new sysctl to disable RST check (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: avoid misleading \u0027invalid\u0027 in log message (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: improve RST handling when tuple is re-used (bsc#1183947 bsc#1185950).\n- nvme-core: add cancel tagset helpers (bsc#1183976).\n- nvme-fabrics: decode host pathing error for connect (bsc#1179827).\n- nvme-fc: check sgl supported by target (bsc#1179827).\n- nvme-fc: clear q_live at beginning of association teardown (bsc#1186479).\n- nvme-fc: return NVME_SC_HOST_ABORTED_CMD when a command has been aborted (bsc#1184259).\n- nvme-fc: set NVME_REQ_CANCELLED in nvme_fc_terminate_exchange() (bsc#1184259).\n- nvme-fc: short-circuit reconnect retries (bsc#1179827).\n- nvme-multipath: fix double initialization of ANA state (bsc#1178612, bsc#1184259).\n- nvme-pci: Remove tag from process cq (git-fixes).\n- nvme-pci: Remove two-pass completions (git-fixes).\n- nvme-pci: Simplify nvme_poll_irqdisable (git-fixes).\n- nvme-pci: align io queue count with allocted nvme_queue in (git-fixes).\n- nvme-pci: avoid race between nvme_reap_pending_cqes() and nvme_poll() (git-fixes).\n- nvme-pci: dma read memory barrier for completions (git-fixes).\n- nvme-pci: fix \u0027slimmer CQ head update\u0027 (git-fixes).\n- nvme-pci: make sure write/poll_queues less or equal then cpu (git-fixes).\n- nvme-pci: remove last_sq_tail (git-fixes).\n- nvme-pci: remove volatile cqes (git-fixes).\n- nvme-pci: slimmer CQ head update (git-fixes).\n- nvme-pci: use simple suspend when a HMB is enabled (git-fixes).\n- nvme-tcp: Fix possible race of io_work and direct send (git-fixes).\n- nvme-tcp: Fix warning with CONFIG_DEBUG_PREEMPT (git-fixes).\n- nvme-tcp: add clean action for failed reconnection (bsc#1183976).\n- nvme-tcp: fix kconfig dependency warning when !CRYPTO (git-fixes).\n- nvme-tcp: fix misuse of __smp_processor_id with preemption (git-fixes).\n- nvme-tcp: fix possible hang waiting for icresp response (bsc#1179519).\n- nvme-tcp: use cancel tagset helper for tear down (bsc#1183976).\n- nvme: Fix NULL dereference for pci nvme controllers (bsc#1182378).\n- nvme: add NVME_REQ_CANCELLED flag in nvme_cancel_request() (bsc#1184259).\n- nvme: define constants for identification values (git-fixes).\n- nvme: do not intialize hwmon for discovery controllers (bsc#1184259).\n- nvme: do not intialize hwmon for discovery controllers (git-fixes).\n- nvme: document nvme controller states (git-fixes).\n- nvme: explicitly update mpath disk capacity on revalidation (git-fixes).\n- nvme: expose reconnect_delay and ctrl_loss_tmo via sysfs (bsc#1182378).\n- nvme: fix controller instance leak (git-fixes).\n- nvme: fix deadlock in disconnect during scan_work and/or ana_work (git-fixes).\n- nvme: fix possible deadlock when I/O is blocked (git-fixes).\n- nvme: remove superfluous else in nvme_ctrl_loss_tmo_store (bsc#1182378).\n- nvme: retrigger ANA log update if group descriptor isn\u0027t found (git-fixes)\n- nvme: simplify error logic in nvme_validate_ns() (bsc#1184259).\n- nvmet: fix a memory leak (git-fixes).\n- nvmet: seset ns-\u003efile when open fails (bsc#1183873).\n- nvmet: use new ana_log_size instead the old one (bsc#1184259).\n- nxp-i2c: restore includes for kABI (bsc#1185589).\n- nxp-nci: add NXP1002 id (bsc#1185589).\n- phy: phy-twl4030-usb: Fix possible use-after-free in twl4030_usb_remove() (git-fixes).\n- pinctrl: ingenic: Improve unreachable code generation (git-fixes).\n- pinctrl: samsung: use \u0027int\u0027 for register masks in Exynos (git-fixes).\n- platform/mellanox: mlxbf-tmfifo: Fix a memory barrier issue (git-fixes).\n- platform/x86: intel_pmc_core: Do not use global pmcdev in quirks (git-fixes).\n- platform/x86: thinkpad_acpi: Correct thermal sensor allocation (git-fixes).\n- posix-timers: Preserve return value in clock_adjtime32() (git-fixes)\n- power: supply: Use IRQF_ONESHOT (git-fixes).\n- power: supply: generic-adc-battery: fix possible use-after-free in gab_remove() (git-fixes).\n- power: supply: s3c_adc_battery: fix possible use-after-free in s3c_adc_bat_remove() (git-fixes).\n- powerpc/64s: Fix crashes when toggling entry flush barrier (bsc#1177666 git-fixes).\n- powerpc/64s: Fix crashes when toggling stf barrier (bsc#1087082 git-fixes).\n- qtnfmac: Fix possible buffer overflow in qtnf_event_handle_external_auth (git-fixes).\n- rtc: pcf2127: handle timestamp interrupts (bsc#1185495).\n- s390/dasd: fix hanging DASD driver unbind (bsc#1183932 LTC#192153).\n- s390/entry: save the caller of psw_idle (bsc#1185677).\n- s390/kdump: fix out-of-memory with PCI (bsc#1182257 LTC#191375).\n- sched/eas: Do not update misfit status if the task is pinned (git-fixes)\n- sched/fair: Avoid stale CPU util_est value for schedutil in (git-fixes)\n- sched/fair: Fix unfairness caused by missing load decay (git-fixes)\n- scripts/git_sort/git_sort.py: add bpf git repo\n- scsi: core: Run queue in case of I/O resource contention failure (bsc#1186416).\n- scsi: fnic: Kill \u0027exclude_id\u0027 argument to fnic_cleanup_io() (bsc#1179851).\n- scsi: libfc: Avoid invoking response handler twice if ep is already completed (bsc#1186573).\n- scsi: lpfc: Add a option to enable interlocked ABTS before job completion (bsc#1186451).\n- scsi: lpfc: Add ndlp kref accounting for resume RPI path (bsc#1186451).\n- scsi: lpfc: Fix \u0027Unexpected timeout\u0027 error in direct attach topology (bsc#1186451).\n- scsi: lpfc: Fix Node recovery when driver is handling simultaneous PLOGIs (bsc#1186451).\n- scsi: lpfc: Fix bad memory access during VPD DUMP mailbox command (bsc#1186451).\n- scsi: lpfc: Fix crash when lpfc_sli4_hba_setup() fails to initialize the SGLs (bsc#1186451).\n- scsi: lpfc: Fix node handling for Fabric Controller and Domain Controller (bsc#1186451).\n- scsi: lpfc: Fix non-optimized ERSP handling (bsc#1186451).\n- scsi: lpfc: Fix unreleased RPIs when NPIV ports are created (bsc#1186451).\n- scsi: lpfc: Ignore GID-FT response that may be received after a link flip (bsc#1186451).\n- scsi: lpfc: Reregister FPIN types if ELS_RDF is received from fabric controller (bsc#1186451).\n- scsi: lpfc: Update lpfc version to 12.8.0.10 (bsc#1186451).\n- sctp: delay auto_asconf init until binding the first addr (\u0026lt;cover.1620748346.git.mkubecek@suse.cz\u003e).\n- serial: core: fix suspicious security_locked_down() call (git-fixes).\n- serial: core: return early on unsupported ioctls (git-fixes).\n- serial: sh-sci: Fix off-by-one error in FIFO threshold register setting (git-fixes).\n- serial: stm32: fix incorrect characters on console (git-fixes).\n- serial: stm32: fix tx_empty condition (git-fixes).\n- serial: tegra: Fix a mask operation that is always true (git-fixes).\n- smc: disallow TCP_ULP in smc_setsockopt() (git-fixes).\n- spi: ath79: always call chipselect function (git-fixes).\n- spi: ath79: remove spi-master setup and cleanup assignment (git-fixes).\n- spi: dln2: Fix reference leak to master (git-fixes).\n- spi: omap-100k: Fix reference leak to master (git-fixes).\n- spi: qup: fix PM reference leak in spi_qup_remove() (git-fixes).\n- spi: spi-fsl-dspi: Fix a resource leak in an error handling path (git-fixes).\n- staging: emxx_udc: fix loop in _nbu2ss_nuke() (git-fixes).\n- staging: iio: cdc: ad7746: avoid overwrite of num_channels (git-fixes).\n- tcp: fix to update snd_wl1 in bulk receiver fast path (\u0026lt;cover.1620748346.git.mkubecek@suse.cz\u003e).\n- thermal/drivers/ti-soc-thermal/bandgap Remove unused variable \u0027val\u0027 (git-fixes).\n- thunderbolt: dma_port: Fix NVM read buffer bounds and offset issue (git-fixes).\n- tracing: Map all PIDs to command lines (git-fixes).\n- tty: amiserial: fix TIOCSSERIAL permission check (git-fixes).\n- tty: fix memory leak in vc_deallocate (git-fixes).\n- tty: moxa: fix TIOCSSERIAL jiffies conversions (git-fixes).\n- tty: moxa: fix TIOCSSERIAL permission check (git-fixes).\n- uio: uio_hv_generic: use devm_kzalloc() for private data alloc (git-fixes).\n- uio_hv_generic: Fix a memory leak in error handling paths (git-fixes).\n- uio_hv_generic: Fix another memory leak in error handling paths (git-fixes).\n- uio_hv_generic: add missed sysfs_remove_bin_file (git-fixes).\n- usb: core: hub: Fix PM reference leak in usb_port_resume() (git-fixes).\n- usb: core: hub: fix race condition about TRSMRCY of resume (git-fixes).\n- usb: dwc2: Fix gadget DMA unmap direction (git-fixes).\n- usb: dwc3: gadget: Enable suspend events (git-fixes).\n- usb: dwc3: gadget: Return success always for kick transfer in ep queue (git-fixes).\n- usb: dwc3: omap: improve extcon initialization (git-fixes).\n- usb: dwc3: pci: Enable usb2-gadget-lpm-disable for Intel Merrifield (git-fixes).\n- usb: fotg210-hcd: Fix an error message (git-fixes).\n- usb: gadget/function/f_fs string table fix for multiple languages (git-fixes).\n- usb: gadget: dummy_hcd: fix gpf in gadget_setup (git-fixes).\n- usb: gadget: f_uac1: validate input parameters (git-fixes).\n- usb: gadget: f_uac2: validate input parameters (git-fixes).\n- usb: gadget: udc: renesas_usb3: Fix a race in usb3_start_pipen() (git-fixes).\n- usb: gadget: uvc: add bInterval checking for HS mode (git-fixes).\n- usb: musb: fix PM reference leak in musb_irq_work() (git-fixes).\n- usb: sl811-hcd: improve misleading indentation (git-fixes).\n- usb: webcam: Invalid size of Processing Unit Descriptor (git-fixes).\n- usb: xhci: Fix port minor revision (git-fixes).\n- usb: xhci: Increase timeout for HC halt (git-fixes).\n- vgacon: Record video mode changes with VT_RESIZEX (git-fixes).\n- video: hyperv_fb: Add ratelimit on error message (bsc#1185725).\n- vrf: fix a comment about loopback device (git-fixes).\n- watchdog/softlockup: Remove obsolete check of last reported task (bsc#1185982).\n- watchdog/softlockup: report the overall time of softlockups (bsc#1185982).\n- watchdog: explicitly update timestamp when reporting softlockup (bsc#1185982).\n- watchdog: rename __touch_watchdog() to a better descriptive name (bsc#1185982).\n- whitespace cleanup\n- wl3501_cs: Fix out-of-bounds warnings in wl3501_mgmt_join (git-fixes).\n- wl3501_cs: Fix out-of-bounds warnings in wl3501_send_pkt (git-fixes).\n- workqueue: Minor follow-ups to the rescuer destruction change (bsc#1185911).\n- workqueue: more destroy_workqueue() fixes (bsc#1185911).\n- x86/cpu: Initialize MSR_TSC_AUX if RDTSCP *or* RDPID is supported (bsc#1152489).\n- xhci: Do not use GFP_KERNEL in (potentially) atomic context (git-fixes).\n- xhci: check control context is valid before dereferencing it (git-fixes).\n- xhci: fix potential array out of bounds with several interrupters (git-fixes).\n- xsk: Respect device\u0027s headroom and tailroom on generic xmit path (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2021-843",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_0843-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2021:0843-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QHZZYSYX2W3FJK73UGT72F2DQ37IKCJY/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2021:0843-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QHZZYSYX2W3FJK73UGT72F2DQ37IKCJY/"
},
{
"category": "self",
"summary": "SUSE Bug 1087082",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "self",
"summary": "SUSE Bug 1133021",
"url": "https://bugzilla.suse.com/1133021"
},
{
"category": "self",
"summary": "SUSE Bug 1152457",
"url": "https://bugzilla.suse.com/1152457"
},
{
"category": "self",
"summary": "SUSE Bug 1152489",
"url": "https://bugzilla.suse.com/1152489"
},
{
"category": "self",
"summary": "SUSE Bug 1155518",
"url": "https://bugzilla.suse.com/1155518"
},
{
"category": "self",
"summary": "SUSE Bug 1156395",
"url": "https://bugzilla.suse.com/1156395"
},
{
"category": "self",
"summary": "SUSE Bug 1164648",
"url": "https://bugzilla.suse.com/1164648"
},
{
"category": "self",
"summary": "SUSE Bug 1177666",
"url": "https://bugzilla.suse.com/1177666"
},
{
"category": "self",
"summary": "SUSE Bug 1178418",
"url": "https://bugzilla.suse.com/1178418"
},
{
"category": "self",
"summary": "SUSE Bug 1179519",
"url": "https://bugzilla.suse.com/1179519"
},
{
"category": "self",
"summary": "SUSE Bug 1179827",
"url": "https://bugzilla.suse.com/1179827"
},
{
"category": "self",
"summary": "SUSE Bug 1179851",
"url": "https://bugzilla.suse.com/1179851"
},
{
"category": "self",
"summary": "SUSE Bug 1182378",
"url": "https://bugzilla.suse.com/1182378"
},
{
"category": "self",
"summary": "SUSE Bug 1182999",
"url": "https://bugzilla.suse.com/1182999"
},
{
"category": "self",
"summary": "SUSE Bug 1183346",
"url": "https://bugzilla.suse.com/1183346"
},
{
"category": "self",
"summary": "SUSE Bug 1183976",
"url": "https://bugzilla.suse.com/1183976"
},
{
"category": "self",
"summary": "SUSE Bug 1184259",
"url": "https://bugzilla.suse.com/1184259"
},
{
"category": "self",
"summary": "SUSE Bug 1185428",
"url": "https://bugzilla.suse.com/1185428"
},
{
"category": "self",
"summary": "SUSE Bug 1185495",
"url": "https://bugzilla.suse.com/1185495"
},
{
"category": "self",
"summary": "SUSE Bug 1185589",
"url": "https://bugzilla.suse.com/1185589"
},
{
"category": "self",
"summary": "SUSE Bug 1185645",
"url": "https://bugzilla.suse.com/1185645"
},
{
"category": "self",
"summary": "SUSE Bug 1185703",
"url": "https://bugzilla.suse.com/1185703"
},
{
"category": "self",
"summary": "SUSE Bug 1185725",
"url": "https://bugzilla.suse.com/1185725"
},
{
"category": "self",
"summary": "SUSE Bug 1185758",
"url": "https://bugzilla.suse.com/1185758"
},
{
"category": "self",
"summary": "SUSE Bug 1185861",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "self",
"summary": "SUSE Bug 1185863",
"url": "https://bugzilla.suse.com/1185863"
},
{
"category": "self",
"summary": "SUSE Bug 1185911",
"url": "https://bugzilla.suse.com/1185911"
},
{
"category": "self",
"summary": "SUSE Bug 1185938",
"url": "https://bugzilla.suse.com/1185938"
},
{
"category": "self",
"summary": "SUSE Bug 1185982",
"url": "https://bugzilla.suse.com/1185982"
},
{
"category": "self",
"summary": "SUSE Bug 1186320",
"url": "https://bugzilla.suse.com/1186320"
},
{
"category": "self",
"summary": "SUSE Bug 1186416",
"url": "https://bugzilla.suse.com/1186416"
},
{
"category": "self",
"summary": "SUSE Bug 1186439",
"url": "https://bugzilla.suse.com/1186439"
},
{
"category": "self",
"summary": "SUSE Bug 1186460",
"url": "https://bugzilla.suse.com/1186460"
},
{
"category": "self",
"summary": "SUSE Bug 1186484",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "self",
"summary": "SUSE Bug 1186573",
"url": "https://bugzilla.suse.com/1186573"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24586 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24587 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24587/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24588 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26139 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26141 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26145 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26145/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26147 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23134 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32399 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33034 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33034/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33200 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3491 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3491/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-06-06T08:12:41Z",
"generator": {
"date": "2021-06-06T08:12:41Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2021:0843-1",
"initial_release_date": "2021-06-06T08:12:41Z",
"revision_history": [
{
"date": "2021-06-06T08:12:41Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-5.3.18-lp152.78.1.noarch",
"product": {
"name": "kernel-devel-5.3.18-lp152.78.1.noarch",
"product_id": "kernel-devel-5.3.18-lp152.78.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-5.3.18-lp152.78.1.noarch",
"product": {
"name": "kernel-docs-5.3.18-lp152.78.1.noarch",
"product_id": "kernel-docs-5.3.18-lp152.78.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-5.3.18-lp152.78.1.noarch",
"product": {
"name": "kernel-docs-html-5.3.18-lp152.78.1.noarch",
"product_id": "kernel-docs-html-5.3.18-lp152.78.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-5.3.18-lp152.78.1.noarch",
"product": {
"name": "kernel-macros-5.3.18-lp152.78.1.noarch",
"product_id": "kernel-macros-5.3.18-lp152.78.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-5.3.18-lp152.78.1.noarch",
"product": {
"name": "kernel-source-5.3.18-lp152.78.1.noarch",
"product_id": "kernel-source-5.3.18-lp152.78.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"product": {
"name": "kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"product_id": "kernel-source-vanilla-5.3.18-lp152.78.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-5.3.18-lp152.78.1.x86_64",
"product": {
"name": "kernel-debug-5.3.18-lp152.78.1.x86_64",
"product_id": "kernel-debug-5.3.18-lp152.78.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"product": {
"name": "kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"product_id": "kernel-debug-devel-5.3.18-lp152.78.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-lp152.78.1.x86_64",
"product": {
"name": "kernel-default-5.3.18-lp152.78.1.x86_64",
"product_id": "kernel-default-5.3.18-lp152.78.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"product": {
"name": "kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"product_id": "kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"product_id": "kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"product": {
"name": "kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"product_id": "kernel-default-devel-5.3.18-lp152.78.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"product": {
"name": "kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"product_id": "kernel-kvmsmall-5.3.18-lp152.78.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"product_id": "kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"product": {
"name": "kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"product_id": "kernel-obs-build-5.3.18-lp152.78.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"product": {
"name": "kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"product_id": "kernel-obs-qa-5.3.18-lp152.78.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-lp152.78.1.x86_64",
"product": {
"name": "kernel-preempt-5.3.18-lp152.78.1.x86_64",
"product_id": "kernel-preempt-5.3.18-lp152.78.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"product": {
"name": "kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"product_id": "kernel-preempt-devel-5.3.18-lp152.78.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-lp152.78.1.x86_64",
"product": {
"name": "kernel-syms-5.3.18-lp152.78.1.x86_64",
"product_id": "kernel-syms-5.3.18-lp152.78.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.2",
"product": {
"name": "openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-5.3.18-lp152.78.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64"
},
"product_reference": "kernel-debug-5.3.18-lp152.78.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-5.3.18-lp152.78.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64"
},
"product_reference": "kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-lp152.78.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-lp152.78.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64"
},
"product_reference": "kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-lp152.78.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-lp152.78.1.noarch as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-lp152.78.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-lp152.78.1.noarch as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-lp152.78.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-html-5.3.18-lp152.78.1.noarch as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch"
},
"product_reference": "kernel-docs-html-5.3.18-lp152.78.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-5.3.18-lp152.78.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64"
},
"product_reference": "kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64"
},
"product_reference": "kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-lp152.78.1.noarch as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-lp152.78.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-lp152.78.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-5.3.18-lp152.78.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64"
},
"product_reference": "kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-lp152.78.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-lp152.78.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-lp152.78.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-lp152.78.1.noarch as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch"
},
"product_reference": "kernel-source-5.3.18-lp152.78.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-5.3.18-lp152.78.1.noarch as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch"
},
"product_reference": "kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-lp152.78.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-lp152.78.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-24586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24586"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24586",
"url": "https://www.suse.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-06T08:12:41Z",
"details": "moderate"
}
],
"title": "CVE-2020-24586"
},
{
"cve": "CVE-2020-24587",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24587"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24587",
"url": "https://www.suse.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1185862 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-06T08:12:41Z",
"details": "moderate"
}
],
"title": "CVE-2020-24587"
},
{
"cve": "CVE-2020-24588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24588"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24588",
"url": "https://www.suse.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "SUSE Bug 1185861 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1192868"
},
{
"category": "external",
"summary": "SUSE Bug 1199701 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1199701"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-06T08:12:41Z",
"details": "moderate"
}
],
"title": "CVE-2020-24588"
},
{
"cve": "CVE-2020-26139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26139"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26139",
"url": "https://www.suse.com/security/cve/CVE-2020-26139"
},
{
"category": "external",
"summary": "SUSE Bug 1186062 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-06T08:12:41Z",
"details": "moderate"
}
],
"title": "CVE-2020-26139"
},
{
"cve": "CVE-2020-26141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26141"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26141",
"url": "https://www.suse.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "SUSE Bug 1185987 for CVE-2020-26141",
"url": "https://bugzilla.suse.com/1185987"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-06T08:12:41Z",
"details": "moderate"
}
],
"title": "CVE-2020-26141"
},
{
"cve": "CVE-2020-26145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26145"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26145",
"url": "https://www.suse.com/security/cve/CVE-2020-26145"
},
{
"category": "external",
"summary": "SUSE Bug 1185860 for CVE-2020-26145",
"url": "https://bugzilla.suse.com/1185860"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-06T08:12:41Z",
"details": "moderate"
}
],
"title": "CVE-2020-26145"
},
{
"cve": "CVE-2020-26147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26147"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26147",
"url": "https://www.suse.com/security/cve/CVE-2020-26147"
},
{
"category": "external",
"summary": "SUSE Bug 1233723 for CVE-2020-26147",
"url": "https://bugzilla.suse.com/1233723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-06T08:12:41Z",
"details": "moderate"
}
],
"title": "CVE-2020-26147"
},
{
"cve": "CVE-2021-23134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23134"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23134",
"url": "https://www.suse.com/security/cve/CVE-2021-23134"
},
{
"category": "external",
"summary": "SUSE Bug 1186060 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "external",
"summary": "SUSE Bug 1186061 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "external",
"summary": "SUSE Bug 1220739 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1220739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-06T08:12:41Z",
"details": "important"
}
],
"title": "CVE-2021-23134"
},
{
"cve": "CVE-2021-32399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32399"
}
],
"notes": [
{
"category": "general",
"text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32399",
"url": "https://www.suse.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "SUSE Bug 1184611 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "external",
"summary": "SUSE Bug 1185898 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "external",
"summary": "SUSE Bug 1185899 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-06T08:12:41Z",
"details": "important"
}
],
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-33034",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33034"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33034",
"url": "https://www.suse.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "SUSE Bug 1186111 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "external",
"summary": "SUSE Bug 1186285 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-06T08:12:41Z",
"details": "important"
}
],
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-33200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33200"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-\u003ealu_limit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33200",
"url": "https://www.suse.com/security/cve/CVE-2021-33200"
},
{
"category": "external",
"summary": "SUSE Bug 1186484 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "external",
"summary": "SUSE Bug 1186498 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-06T08:12:41Z",
"details": "important"
}
],
"title": "CVE-2021-33200"
},
{
"cve": "CVE-2021-3491",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3491"
}
],
"notes": [
{
"category": "general",
"text": "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3491",
"url": "https://www.suse.com/security/cve/CVE-2021-3491"
},
{
"category": "external",
"summary": "SUSE Bug 1185642 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "external",
"summary": "SUSE Bug 1187090 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1187090"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-06T08:12:41Z",
"details": "important"
}
],
"title": "CVE-2021-3491"
}
]
}
opensuse-su-2021:1975-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP3 Azure kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-33200: Enforcing incorrect limits for pointer arithmetic operations by the BPF verifier could be abused to perform out-of-bounds reads and writes in kernel memory (bsc#1186484).\n- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values. (bsc#1186111)\n- CVE-2020-26139: Fixed a denial-of-service when an Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. (bnc#1186062)\n- CVE-2021-23134: A Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges. (bnc#1186060)\n- CVE-2021-3491: Fixed a potential heap overflow in mem_rw(). This vulnerability is related to the PROVIDE_BUFFERS operation, which allowed the MAX_RW_COUNT limit to be bypassed (bsc#1185642).\n- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).\n- CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances this can be abused to inject arbitrary network packets and/or exfiltrate user data (bnc#1185859).\n- CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed (bnc#1185859 bnc#1185862).\n- CVE-2020-24588: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets. (bnc#1185861)\n- CVE-2020-26147: The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments, even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used (bnc#1185859).\n- CVE-2020-26145: An issue was discovered with Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration. (bnc#1185860)\n- CVE-2020-26141: An issue was discovered in the ALFA driver for AWUS036H, where the Message Integrity Check (authenticity) of fragmented TKIP frames was not verified. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bnc#1185987)\n- CVE-2021-29650: Fixed an issue with the netfilter subsystem that allowed attackers to cause a denial of service (panic) because net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h lack a full memory barrier upon the assignment of a new table value (bnc#1184208).\n- CVE-2021-29155: Fixed an issue that was discovered in kernel/bpf/verifier.c that performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory. Specifically, for sequences of pointer arithmetic operations, the pointer modification performed by the first operation was not correctly accounted for when restricting subsequent operations (bnc#1184942).\n- CVE-2021-3444: Fixed an issue with the bpf verifier which did not properly handle mod32 destination register truncation when the source register was known to be 0 leading to out of bounds read (bsc#1184170).\n- CVE-2021-3428: Fixed an integer overflow in ext4_es_cache_extent (bsc#1173485).\n- CVE-2021-29647: Fixed an issue in qrtr_recvmsg which could have allowed attackers to obtain sensitive information from kernel memory because of a partially uninitialized data structure (bsc#1184192 ).\n- CVE-2021-29265: Fixed an issue in usbip_sockfd_store which could have allowed attackers to cause a denial of service due to race conditions during an update of the local and shared status (bsc#1184167).\n- CVE-2021-29264: Fixed an issue in the Freescale Gianfar Ethernet driver which could have allowed attackers to cause a system crash due to a calculation of negative fragment size (bsc#1184168).\n- CVE-2021-28972: Fixed a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly (bsc#1184198).\n- CVE-2021-28971: Fixed an issue in intel_pmu_drain_pebs_nhm which could have caused a system crash because the PEBS status in a PEBS record was mishandled (bsc#1184196 ).\n- CVE-2021-28964: Fixed a race condition in get_old_root which could have allowed attackers to cause a denial of service (bsc#1184193).\n- CVE-2021-28688: Fixed an issue introduced by XSA-365 (bsc#1183646).\n- CVE-2021-28660: Fixed an out of bounds write in rtw_wx_set_scan (bsc#1183593 ).\n- CVE-2021-28375: Fixed an issue in fastrpc_internal_invoke which did not prevent user applications from sending kernel RPC messages (bsc#1183596).\n- CVE-2021-28038: Fixed an issue with the netback driver which was lacking necessary treatment of errors such as failed memory allocations (bsc#1183022).\n- CVE-2021-27365: Fixed an issue where an unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message (bsc#1182715).\n- CVE-2021-27364: Fixed an issue where an attacker could craft Netlink messages (bsc#1182717).\n- CVE-2021-27363: Fixed a kernel pointer leak which could have been used to determine the address of the iscsi_transport structure (bsc#1182716).\n- CVE-2020-35519: Fixed an out-of-bounds memory access was found in x25_bind (bsc#1183696).\n- CVE-2020-27815: Fixed an issue in JFS filesystem where could have allowed an attacker to execute code (bsc#1179454).\n- CVE-2020-27171: Fixed an off-by-one error affecting out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory (bsc#1183775).\n- CVE-2020-27170: Fixed potential side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory (bsc#1183686).\n- CVE-2019-19769: Fixed a use-after-free in the perf_trace_lock_acquire function (bsc#1159280 ).\n- CVE-2019-18814: Fixed a use-after-free when aa_label_parse() fails in aa_audit_rule_init() (bsc#1156256).\n- CVE-2021-3483: Fixed a use-after-free in nosy.c (bsc#1184393).\n- CVE-2021-30002: Fixed a memory leak for large arguments in video_usercopy (bsc#1184120).\n- CVE-2021-29154: Fixed incorrect computation of branch displacements, allowing arbitrary code execution (bsc#1184391).\n- CVE-2021-28950: Fixed an issue in fs/fuse/fuse_i.h due to a retry loop continually was finding the same bad inode (bsc#1184194).\n- CVE-2021-28952: Fixed a buffer overflow in the soundwire device driver, triggered when an unexpected port ID number is encountered. (bnc#1184197).\n- CVE-2021-20268: Fixed an out-of-bounds access flaw in the implementation of the eBPF code verifier. This flaw allowed a local user to crash the system or possibly escalate their privileges. (bnc#1183077)\n- CVE-2020-27673: Fixed a vulnerability with xen, where guest OS users could cause a denial of service (host OS hang) via a high rate of events to dom0 (bnc#1177411).\n- CVE-2020-36312: Fixed a memory leak upon a kmalloc failure (bsc#1184509 ).\n- CVE-2020-36311: Fixed a denial of service (soft lockup) by triggering destruction of a large SEV VM (bsc#1184511).\n- CVE-2020-36310: Fixed infinite loop for certain nested page faults (bsc#1184512).\n- CVE-2021-3489: Fixed an issue where the eBPF RINGBUF bpf_ringbuf_reserve did not check that the allocated size was smaller than the ringbuf size (bnc#1185640).\n- CVE-2021-3490: Fixed an issue where the eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) did not update the 32-bit bounds (bnc#1185641 bnc#1185796 ).\n- CVE-2020-36322: Fixed an issue was discovered in FUSE filesystem implementation which could have caused a system crash (bsc#1184211).\n- CVE-2020-25670, CVE-2020-25671, CVE-2020-25672, CVE-2020-25673: Fixed multiple bugs in NFC subsytem (bsc#1178181).\n\nThe following non-security bugs were fixed:\n\n- ACPI / hotplug / PCI: Fix reference count leak in enable_slot() (git-fixes).\n- ACPI / idle: override c-state latency when not in conformance with s0ix (bsc#1185840).\n- ACPI: CPPC: Replace cppc_attr with kobj_attribute (git-fixes).\n- ACPI: GTDT: Do not corrupt interrupt mappings on watchdow probe failure (git-fixes).\n- ACPI: PM: Add ACPI ID of Alder Lake Fan (git-fixes).\n- ACPI: PM: s2idle: Add AMD support to handle _DSM (bsc#1185840).\n- ACPI: PM: s2idle: Add missing LPS0 functions for AMD (bsc#1185840).\n- ACPI: PM: s2idle: Drop unused local variables and related code (bsc#1185840).\n- ACPI: PM: s2idle: Move x86-specific code to the x86 directory (bsc#1185840).\n- ACPI: custom_method: fix a possible memory leak (git-fixes).\n- ACPI: custom_method: fix potential use-after-free issue (git-fixes).\n- ACPI: processor: Fix CPU0 wakeup in acpi_idle_play_dead() (git-fixes).\n- ACPI: processor: Fix build when CONFIG_ACPI_PROCESSOR=m (git-fixes).\n- ACPI: scan: Rearrange memory allocation in acpi_device_add() (git-fixes).\n- ACPI: video: Add DMI quirk for GIGABYTE GB-BXBT-2807 (git-fixes).\n- ACPI: video: Add missing callback back for Sony VPCEH3U1E (git-fixes).\n- ACPICA: Always create namespace nodes using acpi_ns_create_node() (git-fixes).\n- ACPICA: Enable sleep button on ACPI legacy wake (bsc#1181383).\n- ACPICA: Fix race in generic_serial_bus (I2C) and GPIO op_region parameter handling (git-fixes).\n- ALSA: Convert strlcpy to strscpy when return value is unused (git-fixes).\n- ALSA: aloop: Fix initialization of controls (git-fixes).\n- ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro (git-fixes).\n- ALSA: bebob: enable to deliver MIDI messages for multiple ports (git-fixes).\n- ALSA: core: remove redundant spin_lock pair in snd_card_disconnect (git-fixes).\n- ALSA: dice: fix null pointer dereference when node is disconnected (git-fixes).\n- ALSA: dice: fix stream format at middle sampling rate for Alesis iO 26 (git-fixes).\n- ALSA: dice: fix stream format for TC Electronic Konnekt Live at high sampling transfer frequency (git-fixes).\n- ALSA: emu8000: Fix a use after free in snd_emu8000_create_mixer (git-fixes).\n- ALSA: firewire-lib: fix amdtp_packet tracepoints event for packet_index field (git-fixes).\n- ALSA: firewire-lib: fix calculation for size of IR context payload (git-fixes).\n- ALSA: firewire-lib: fix check for the size of isochronous packet payload (git-fixes).\n- ALSA: hda/ca0132: Add Sound BlasterX AE-5 Plus support (git-fixes).\n- ALSA: hda/cirrus: Add Headphone and Headset MIC Volume Control (git-fixes).\n- ALSA: hda/cirrus: Add error handling into CS8409 I2C functions (git-fixes).\n- ALSA: hda/cirrus: Add jack detect interrupt support from CS42L42 companion codec (git-fixes).\n- ALSA: hda/cirrus: Add support for CS8409 HDA bridge and CS42L42 companion codec (git-fixes).\n- ALSA: hda/cirrus: Cleanup patch_cirrus.c code (git-fixes).\n- ALSA: hda/cirrus: Fix CS42L42 Headset Mic volume control name (git-fixes).\n- ALSA: hda/cirrus: Make CS8409 driver more generic by using fixups (git-fixes).\n- ALSA: hda/cirrus: Set Initial DMIC volume for Bullseye to -26 dB (git-fixes).\n- ALSA: hda/cirrus: Use CS8409 filter to fix abnormal sounds on Bullseye (git-fixes).\n- ALSA: hda/conexant: Add quirk for mute LED control on HP ZBook G5 (git-fixes).\n- ALSA: hda/conexant: Apply quirk for another HP ZBook G5 model (git-fixes).\n- ALSA: hda/conexant: Re-order CX5066 quirk table entries (git-fixes).\n- ALSA: hda/conexant: Re-order CX5066 quirk table entries (git-fixes).\n- ALSA: hda/hdmi: Cancel pending works before suspend (bsc#1182377).\n- ALSA: hda/hdmi: Cancel pending works before suspend (git-fixes).\n- ALSA: hda/hdmi: fix race in handling acomp ELD notification at resume (git-fixes).\n- ALSA: hda/realtek - Headset Mic issue on HP platform (git-fixes).\n- ALSA: hda/realtek: ALC285 Thinkpad jack pin quirk is unreachable (git-fixes).\n- ALSA: hda/realtek: Add fixup for HP OMEN laptop (git-fixes).\n- ALSA: hda/realtek: Add fixup for HP Spectre x360 15-df0xxx (git-fixes).\n- ALSA: hda/realtek: Add quirk for Intel Clevo PCx0Dx (git-fixes).\n- ALSA: hda/realtek: Add quirk for Lenovo Ideapad S740 (git-fixes).\n- ALSA: hda/realtek: Add some CLOVE SSIDs of ALC293 (git-fixes).\n- ALSA: hda/realtek: Apply headset-mic quirks for Xiaomi Redmibook Air (git-fixes).\n- ALSA: hda/realtek: Chain in pop reduction fixup for ThinkStation P340 (git-fixes).\n- ALSA: hda/realtek: Enable mute/micmute LEDs and limit mic boost on EliteBook 845 G8 (git-fixes).\n- ALSA: hda/realtek: Fix silent headphone output on ASUS UX430UA (git-fixes).\n- ALSA: hda/realtek: Fix speaker amp on HP Envy AiO 32 (git-fixes).\n- ALSA: hda/realtek: Fix speaker amp setup on Acer Aspire E1 (git-fixes).\n- ALSA: hda/realtek: GA503 use same quirks as GA401 (git-fixes).\n- ALSA: hda/realtek: Headphone volume is controlled by Front mixer (git-fixes).\n- ALSA: hda/realtek: Re-order ALC269 ASUS quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC269 Acer quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC269 Dell quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC269 HP quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC269 Lenovo quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC269 Sony quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC662 quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC882 Acer quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC882 Clevo quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC882 Sony quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order remaining ALC269 quirk table entries (git-fixes).\n- ALSA: hda/realtek: Remove redundant entry for ALC861 Haier/Uniwill devices (git-fixes).\n- ALSA: hda/realtek: apply pin quirk for XiaomiNotebook Pro (git-fixes).\n- ALSA: hda/realtek: call alc_update_headset_mode() in hp_automute_hook (git-fixes).\n- ALSA: hda/realtek: fix a determine_headset_type issue for a Dell AIO (git-fixes).\n- ALSA: hda/realtek: fix mic boost on Intel NUC 8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs and speaker for HP Zbook Fury 15 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs and speaker for HP Zbook Fury 17 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs and speaker for HP Zbook G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP 440 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP 640 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP 840 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP 850 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP 855 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP ProBook 445 G7 (git-fixes).\n- ALSA: hda/realtek: fix static noise on ALC285 Lenovo laptops (git-fixes).\n- ALSA: hda/realtek: reset eapd coeff to default value for alc287 (git-fixes).\n- ALSA: hda/realtek: the bass speaker can\u0027t output sound on Yoga 9i (git-fixes).\n- ALSA: hda: Add missing sanity checks in PM prepare/complete callbacks (git-fixes).\n- ALSA: hda: Avoid spurious unsol event handling during S3/S4 (bsc#1182377).\n- ALSA: hda: Avoid spurious unsol event handling during S3/S4 (git-fixes).\n- ALSA: hda: Drop the BATCH workaround for AMD controllers (git-fixes).\n- ALSA: hda: Flush pending unsolicited events before suspend (bsc#1182377).\n- ALSA: hda: Re-add dropped snd_poewr_change_state() calls (git-fixes).\n- ALSA: hda: fixup headset for ASUS GU502 laptop (git-fixes).\n- ALSA: hda: fixup headset for ASUS GU502 laptop (git-fixes).\n- ALSA: hda: generic: Fix the micmute led init state (git-fixes).\n- ALSA: hda: generic: change the DAC ctl name for LO+SPK or LO+HP (git-fixes).\n- ALSA: hda: ignore invalid NHLT table (git-fixes).\n- ALSA: hdsp: do not disable if not enabled (git-fixes).\n- ALSA: hdspm: do not disable if not enabled (git-fixes).\n- ALSA: intel8x0: Do not update period unless prepared (git-fixes).\n- ALSA: line6: Fix racy initialization of LINE6 MIDI (git-fixes).\n- ALSA: rme9652: do not disable if not enabled (git-fixes).\n- ALSA: sb: Fix two use after free in snd_sb_qsound_build (git-fixes).\n- ALSA: usb-audio: Add DJM-450 to the quirks table (git-fixes).\n- ALSA: usb-audio: Add DJM450 to Pioneer format quirk (git-fixes).\n- ALSA: usb-audio: Add DJM450 to Pioneer format quirk (git-fixes).\n- ALSA: usb-audio: Add DJM750 to Pioneer mixer quirk (git-fixes).\n- ALSA: usb-audio: Add MIDI quirk for Vox ToneLab EX (git-fixes).\n- ALSA: usb-audio: Add Pioneer DJM-850 to quirks-table (git-fixes).\n- ALSA: usb-audio: Add dB range mapping for Sennheiser Communications Headset PC 8 (git-fixes).\n- ALSA: usb-audio: Add error checks for usb_driver_claim_interface() calls (git-fixes).\n- ALSA: usb-audio: Add implicit feeback support for the BOSS GT-1 (git-fixes).\n- ALSA: usb-audio: Add support for Pioneer DJM-750 (git-fixes).\n- ALSA: usb-audio: Add support for many Roland devices\u0027 implicit feedback quirks (git-fixes).\n- ALSA: usb-audio: Apply implicit feedback mode for BOSS devices (git-fixes).\n- ALSA: usb-audio: Apply sample rate quirk to Logitech Connect (git-fixes).\n- ALSA: usb-audio: Carve out connector value checking into a helper (git-fixes).\n- ALSA: usb-audio: Check connector value on resume (git-fixes).\n- ALSA: usb-audio: Configure Pioneer DJM-850 samplerate (git-fixes).\n- ALSA: usb-audio: Convert remaining strlcpy() to strscpy() (git-fixes).\n- ALSA: usb-audio: Convert the last strlcpy() usage (git-fixes).\n- ALSA: usb-audio: DJM-750: ensure format is set (git-fixes).\n- ALSA: usb-audio: Declare Pioneer DJM-850 mixer controls (git-fixes).\n- ALSA: usb-audio: Drop implicit fb quirk entries dubbed for capture (git-fixes).\n- ALSA: usb-audio: Explicitly set up the clock selector (git-fixes).\n- ALSA: usb-audio: Fix \u0027RANGE setting not yet supported\u0027 errors (git-fixes).\n- ALSA: usb-audio: Fix Pioneer DJM devices URB_CONTROL request direction to set samplerate (git-fixes).\n- ALSA: usb-audio: Fix Pioneer DJM devices URB_CONTROL request direction to set samplerate (git-fixes).\n- ALSA: usb-audio: Fix implicit sync clearance at stopping stream (git-fixes).\n- ALSA: usb-audio: Fix potential out-of-bounce access in MIDI EP parser (git-fixes).\n- ALSA: usb-audio: Fix unintentional sign extension issue (git-fixes).\n- ALSA: usb-audio: Generic application of implicit fb to Roland/BOSS devices (git-fixes).\n- ALSA: usb-audio: Re-apply implicit feedback mode to Pioneer devices (git-fixes).\n- ALSA: usb-audio: Remove redundant assignment to len (git-fixes).\n- ALSA: usb-audio: Skip probe of UA-101 devices (git-fixes).\n- ALSA: usb-audio: Skip the clock selector inquiry for single connections (git-fixes).\n- ALSA: usb-audio: Validate MS endpoint descriptors (git-fixes).\n- ALSA: usb-audio: add mixer quirks for Pioneer DJM-900NXS2 (git-fixes).\n- ALSA: usb-audio: fix NULL ptr dereference in usb_audio_probe (bsc#1182552).\n- ALSA: usb-audio: fix Pioneer DJM-850 control label info (git-fixes).\n- ALSA: usb-audio: fix control-request direction (git-fixes).\n- ALSA: usb-audio: fix use after free in usb_audio_disconnect (bsc#1182552).\n- ALSA: usb-audio: generate midi streaming substream names from jack names (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix device hang with ehci-pci (git-fixes).\n- ALSA: usb-audio: scarlett2: Improve driver startup messages (git-fixes).\n- ALSA: usb-audio: scarlett2: snd_scarlett_gen2_controls_create() can be static (git-fixes).\n- ALSA: usb-audio: use usb headers rather than define structs locally (git-fixes).\n- ALSA: usb: Use DIV_ROUND_UP() instead of open-coding it (git-fixes).\n- ALSA: usb: midi: do not return -ENOMEM when usb_urb_ep_type_check fails (git-fixes).\n- ARM64: vdso32: Install vdso32 from vdso_install (git-fixes).\n- ASoC: Intel: Add DMI quirk table to soc_intel_is_byt_cr() (git-fixes).\n- ASoC: Intel: boards: sof-wm8804: add check for PLL setting (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for ARCHOS Cesium 140 (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for the Acer One S1002 tablet (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for the Chuwi Hi8 tablet (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for the Estar Beauty HD MID 7316R tablet (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for the Voyo Winpad A15 tablet (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Enable jack-detect support on Asus T100TAF (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Fix HP Pavilion x2 10-p0XX OVCD current threshold (git-fixes).\n- ASoC: Intel: bytcr_rt5651: Add quirk for the Jumper EZpad 7 tablet (git-fixes).\n- ASoC: Intel: kbl_da7219_max98927: Fix kabylake_ssp_fixup function (git-fixes).\n- ASoC: Intel: sof_sdw: add quirk for HP Spectre x360 convertible (git-fixes).\n- ASoC: Intel: sof_sdw: add quirk for new ADL-P Rvp (git-fixes).\n- ASoC: Intel: sof_sdw: reorganize quirks by generation (git-fixes).\n- ASoC: SOF: Intel: HDA: fix core status verification (git-fixes).\n- ASoC: SOF: Intel: HDA: fix core status verification (git-fixes).\n- ASoC: SOF: Intel: hda: remove unnecessary parentheses (git-fixes).\n- ASoC: SOF: Intel: unregister DMIC device on probe error (git-fixes).\n- ASoC: SOF: intel: fix wrong poll bits in dsp power down (git-fixes).\n- ASoC: ak4458: Add MODULE_DEVICE_TABLE (git-fixes).\n- ASoC: ak5558: Add MODULE_DEVICE_TABLE (git-fixes).\n- ASoC: ak5558: Fix s/show/slow/ typo (git-fixes).\n- ASoC: ak5558: correct reset polarity (git-fixes).\n- ASoC: codecs: wcd934x: add a sanity check in set channel map (git-fixes).\n- ASoC: cs35l33: fix an error code in probe() (git-fixes).\n- ASoC: cs42l42: Always wait at least 3ms after reset (git-fixes).\n- ASoC: cs42l42: Do not enable/disable regulator at Bias Level (git-fixes).\n- ASoC: cs42l42: Fix Bitclock polarity inversion (git-fixes).\n- ASoC: cs42l42: Fix channel width support (git-fixes).\n- ASoC: cs42l42: Fix mixer volume control (git-fixes).\n- ASoC: cs42l42: Regmap must use_single_read/write (git-fixes).\n- ASoC: cygnus: fix for_each_child.cocci warnings (git-fixes).\n- ASoC: es8316: Simplify adc_pga_gain_tlv table (git-fixes).\n- ASoC: fsl_esai: Fix TDM slot setup for I2S mode (git-fixes).\n- ASoC: fsl_ssi: Fix TDM slot setup for I2S mode (git-fixes).\n- ASoC: intel: atom: Remove 44100 sample-rate from the media and deep-buffer DAI descriptions (git-fixes).\n- ASoC: intel: atom: Stop advertising non working S24LE support (git-fixes).\n- ASoC: max98373: Added 30ms turn on/off time delay (git-fixes).\n- ASoC: max98373: Changed amp shutdown register as volatile (git-fixes).\n- ASoC: qcom: lpass-cpu: Fix lpass dai ids parse (git-fixes).\n- ASoC: qcom: sdm845: Fix array out of bounds access (git-fixes).\n- ASoC: qcom: sdm845: Fix array out of range on rx slim channels (git-fixes).\n- ASoC: rsnd: call rsnd_ssi_master_clk_start() from rsnd_ssi_init() (git-fixes).\n- ASoC: rsnd: check all BUSIF status when error (git-fixes).\n- ASoC: rsnd: core: Check convert rate in rsnd_hw_params (git-fixes).\n- ASoC: rt1015: fix i2c communication error (git-fixes).\n- ASoC: rt286: Generalize support for ALC3263 codec (git-fixes).\n- ASoC: rt286: Make RT286_SET_GPIO_* readable and writable (git-fixes).\n- ASoC: rt5640: Fix dac- and adc- vol-tlv values being off by a factor of 10 (git-fixes).\n- ASoC: rt5651: Fix dac- and adc- vol-tlv values being off by a factor of 10 (git-fixes).\n- ASoC: rt5659: Update MCLK rate in set_sysclk() (git-fixes).\n- ASoC: rt5670: Add a quirk for the Dell Venue 10 Pro 5055 (git-fixes).\n- ASoC: rt5670: Add emulated \u0027DAC1 Playback Switch\u0027 control (git-fixes).\n- ASoC: rt5670: Remove \u0027HP Playback Switch\u0027 control (git-fixes).\n- ASoC: rt5670: Remove \u0027OUT Channel Switch\u0027 control (git-fixes).\n- ASoC: rt5670: Remove ADC vol-ctrl mute bits poking from Sto1 ADC mixer settings (git-fixes).\n- ASoC: rt711: add snd_soc_component remove callback (git-fixes).\n- ASoC: samsung: snow: remove useless test (git-fixes).\n- ASoC: samsung: tm2_wm5110: check of of_parse return value (git-fixes).\n- ASoC: sgtl5000: set DAP_AVC_CTRL register to correct default value on probe (git-fixes).\n- ASoC: simple-card-utils: Do not handle device clock (git-fixes).\n- ASoC: simple-card: fix possible uninitialized single_cpu local variable (git-fixes).\n- ASoC: soc-core kABI workaround (git-fixes).\n- ASoC: soc-core: Prevent warning if no DMI table is present (git-fixes).\n- ASoC: sunxi: sun4i-codec: fill ASoC card owner (git-fixes).\n- ASoC: wm8960: Fix wrong bclk and lrclk with pll enabled for some chips (git-fixes).\n- ASoC: wm8960: Remove bitclk relax condition in wm8960_configure_sysclk (git-fixes).\n- Bluetooth: Fix incorrect status handling in LE PHY UPDATE event (git-fixes).\n- Bluetooth: Fix null pointer dereference in amp_read_loc_assoc_final_data (git-fixes).\n- Bluetooth: L2CAP: Fix handling LE modes by L2CAP_OPTIONS (git-fixes).\n- Bluetooth: SMP: Fail if remote and local public keys are identical (git-fixes).\n- Bluetooth: Set CONF_NOT_COMPLETE as l2cap_chan default (git-fixes).\n- Bluetooth: avoid deadlock between hci_dev-\u003elock and socket lock (git-fixes).\n- Bluetooth: btqca: Add valid le states quirk (git-fixes).\n- Bluetooth: btusb: Enable quirk boolean flag for Mediatek Chip (git-fixes).\n- Bluetooth: check for zapped sk before connecting (git-fixes).\n- Bluetooth: hci_h5: Set HCI_QUIRK_SIMULTANEOUS_DISCOVERY for btrtl (git-fixes).\n- Bluetooth: initialize skb_queue_head at l2cap_chan_create() (git-fixes).\n- Documentation/ABI: sysfs-platform-ideapad-laptop: update device attribute paths (git-fixes).\n- Drivers: hv: vmbus: Fix Suspend-to-Idle for Generation-2 VM (git-fixes).\n- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185725).\n- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185725).\n- Drivers: hv: vmbus: Use after free in __vmbus_open() (git-fixes).\n- EDAC/amd64: Check for memory before fully initializing an instance (bsc#1183815).\n- EDAC/amd64: Get rid of the ECC disabled long message (bsc#1183815).\n- EDAC/amd64: Use cached data when checking for ECC (bsc#1183815).\n- Goodix Fingerprint device is not a modem (git-fixes).\n- HID: alps: fix error return code in alps_input_configured() (git-fixes).\n- HID: google: add don USB id (git-fixes).\n- HID: i2c-hid: Add I2C_HID_QUIRK_NO_IRQ_AFTER_RESET for ITE8568 EC on Voyo Winpad A15 (git-fixes).\n- HID: mf: add support for 0079:1846 Mayflash/Dragonrise USB Gamecube Adapter (git-fixes).\n- HID: plantronics: Workaround for double volume key presses (git-fixes).\n- HID: wacom: Assign boolean values to a bool variable (git-fixes).\n- HID: wacom: set EV_KEY and EV_ABS only for non-HID_GENERIC type of devices (git-fixes).\n- HSI: Fix PM usage counter unbalance in ssi_hw_init (git-fixes).\n- Hibernation: Fix Hibernate not blocked in Secure Boot with no EFI secret key \n- IB/hfi1: Fix probe time panic when AIP is enabled with a buggy BIOS (jsc#SLE-13208).\n- IB/hfi1: Rework AIP and VNIC dummy netdev usage (jsc#SLE-13208).\n- Input: applespi - do not wait for responses to commands indefinitely (git-fixes).\n- Input: elantech - fix protocol errors for some trackpoints in SMBus mode (git-fixes).\n- Input: elants_i2c - do not bind to i2c-hid compatible ACPI instantiated devices (git-fixes).\n- Input: i8042 - fix Pegatron C15B ID entry (git-fixes).\n- Input: nspire-keypad - enable interrupts only when opened (git-fixes).\n- Input: s6sy761 - fix coordinate read bit shift (git-fixes).\n- Input: silead - add workaround for x86 BIOS-es which bring the chip up in a stuck state (git-fixes).\n- KEYS: trusted: Fix TPM reservation for seal/unseal (git-fixes).\n- KEYS: trusted: Fix memory leak on object td (git-fixes).\n- KVM x86: Extend AMD specific guest behavior to Hygon virtual CPUs (bsc#1183447).\n- KVM: PPC: Book3S HV P9: Restore host CTRL SPR after guest exit (bsc#1156395).\n- KVM: PPC: Make the VMX instruction emulation routines static (bsc#1156395).\n- KVM: SVM: Clear the CR4 register on reset (bsc#1183252).\n- KVM: kvmclock: Fix vCPUs \u003e 64 can\u0027t be online/hotpluged (bsc#1152489).\n- KVM: nVMX: Properly handle userspace interrupt window request (bsc#1183427).\n- KVM: s390: fix guarded storage control register handling (bsc#1133021).\n- KVM: x86: Add helpers to perform CPUID-based guest vendor check (bsc#1183445).\n- KVM: x86: Allow guests to see MSR_IA32_TSX_CTRL even if tsx=off (bsc#1183287).\n- KVM: x86: Allow guests to see MSR_IA32_TSX_CTRL even if tsx=off (bsc#1183323).\n- KVM: x86: Expose XSAVEERPTR to the guest (jsc#SLE-13573).\n- KVM: x86: Return -E2BIG when KVM_GET_SUPPORTED_CPUID hits max entries (bsc#1183428).\n- KVM: x86: Set so called \u0027reserved CR3 bits in LM mask\u0027 at vCPU reset (bsc#1183288).\n- KVM: x86: Set so called \u0027reserved CR3 bits in LM mask\u0027 at vCPU reset (bsc#1183324).\n- KVM: x86: do not reset microcode version on INIT or RESET (bsc#1183412).\n- KVM: x86: list MSR_IA32_UCODE_REV as an emulated MSR (bsc#1183369).\n- NFC: nci: fix memory leak in nci_allocate_device (git-fixes).\n- PCI/AER: Add RCEC AER error injection support (bsc#1174426).\n- PCI/AER: Add pcie_walk_rcec() to RCEC AER handling (bsc#1174426).\n- PCI/AER: Clear AER status from Root Port when resetting Downstream Port (bsc#1174426).\n- PCI/AER: Specify the type of Port that was reset (bsc#1174426).\n- PCI/AER: Use \u0027aer\u0027 variable for capability offset (bsc#1174426).\n- PCI/AER: Write AER Capability only when we control it (bsc#1174426).\n- PCI/ERR: Add pci_walk_bridge() to pcie_do_recovery() (bsc#1174426).\n- PCI/ERR: Add pcie_link_rcec() to associate RCiEPs (bsc#1174426).\n- PCI/ERR: Avoid negated conditional for clarity (bsc#1174426).\n- PCI/ERR: Bind RCEC devices to the Root Port driver (bsc#1174426).\n- PCI/ERR: Bind RCEC devices to the Root Port driver (jsc#SLE-13736 jsc#SLE-14845).\n- PCI/ERR: Cache RCEC EA Capability offset in pci_init_capabilities() (bsc#1174426).\n- PCI/ERR: Clear AER status only when we control AER (bsc#1174426).\n- PCI/ERR: Clear PCIe Device Status errors only if OS owns AER (bsc#1174426).\n- PCI/ERR: Clear status of the reporting device (bsc#1174426).\n- PCI/ERR: Recover from RCEC AER errors (bsc#1174426).\n- PCI/ERR: Recover from RCiEP AER errors (bsc#1174426).\n- PCI/ERR: Rename reset_link() to reset_subordinates() (bsc#1174426).\n- PCI/ERR: Retain status from error notification (bsc#1174426).\n- PCI/ERR: Simplify by computing pci_pcie_type() once (bsc#1174426).\n- PCI/ERR: Simplify by using pci_upstream_bridge() (bsc#1174426).\n- PCI/ERR: Use \u0027bridge\u0027 for clarity in pcie_do_recovery() (bsc#1174426).\n- PCI/PME: Add pcie_walk_rcec() to RCEC PME handling (bsc#1174426).\n- PCI/RCEC: Fix RCiEP device to RCEC association (git-fixes).\n- PCI/RCEC: Fix RCiEP device to RCEC association (jsc#SLE-13736 jsc#SLE-14845 git-fixes).\n- PCI/portdrv: Report reset for frozen channel (bsc#1174426).\n- PCI: Add a REBAR size quirk for Sapphire RX 5600 XT Pulse (git-fixes).\n- PCI: Add function 1 DMA alias quirk for Marvell 9215 SATA controller (git-fixes).\n- PCI: Allow VPD access for QLogic ISP2722 (git-fixes).\n- PCI: Fix pci_register_io_range() memory leak (git-fixes).\n- PCI: PM: Do not read power state in pci_enable_device_flags() (git-fixes).\n- PCI: Release OF node in pci_scan_device()\u0027s error path (git-fixes).\n- PCI: designware-ep: Fix the Header Type check (git-fixes).\n- PCI: dwc: Move iATU detection earlier (git-fixes).\n- PCI: endpoint: Fix missing destroy_workqueue() (git-fixes).\n- PCI: iproc: Fix return value of iproc_msi_irq_domain_alloc() (git-fixes).\n- PCI: keystone: Let AM65 use the pci_ops defined in pcie-designware-host.c (git-fixes).\n- PCI: mediatek: Add missing of_node_put() to fix reference leak (git-fixes).\n- PCI: tegra: Fix ASPM-L1SS advertisement disable code (git-fixes).\n- PCI: tegra: Move \u0027dbi\u0027 accesses to post common DWC initialization (git-fixes).\n- PCI: thunder: Fix compile testing (git-fixes).\n- PCI: xgene-msi: Fix race in installing chained irq handler (git-fixes).\n- PM / devfreq: Use more accurate returned new_freq as resume_freq (git-fixes).\n- PM: EM: postpone creating the debugfs dir till fs_initcall (git-fixes).\n- PM: runtime: Add documentation for pm_runtime_resume_and_get() (git-fixes).\n- PM: runtime: Add pm_runtime_resume_and_get to deal with usage counter (bsc#1183366).\n- PM: runtime: Fix ordering in pm_runtime_get_suppliers() (git-fixes).\n- PM: runtime: Fix ordering in pm_runtime_get_suppliers() (git-fixes).\n- PM: runtime: Fix race getting/putting suppliers at probe (git-fixes).\n- Platform: OLPC: Fix probe error handling (git-fixes).\n- RAS/CEC: Correct ce_add_elem()\u0027s returned values (bsc#1152489).\n- RDMA/addr: create addr_wq with WQ_MEM_RECLAIM flag (bsc#1183346).\n- RDMA/cm: Fix IRQ restore in ib_send_cm_sidr_rep (jsc#SLE-15176).\n- RDMA/core: create ib_cm with WQ_MEM_RECLAIM flag (bsc#1183346).\n- RDMA/hns: Delete redundant abnormal interrupt status (git-fixes).\n- RDMA/hns: Delete redundant condition judgment related to eq (git-fixes).\n- RDMA/mlx5: Fix drop packet rule in egress table (jsc#SLE-15175).\n- RDMA/qedr: Fix error return code in qedr_iw_connect() (jsc#SLE-8215).\n- RDMA/rtrs-clt: Close rtrs client conn before destroying rtrs clt session files (jsc#SLE-15176).\n- RDMA/rtrs-clt: destroy sysfs after removing session from active list (jsc#SLE-15176).\n- RDMA/srp: Fix support for unpopulated and unbalanced NUMA nodes (bsc#1169709)\n- RDMA/srp: Fix support for unpopulated and unbalanced NUMA nodes (bsc#1169709)\n- RDMA/srpt: Fix error return code in srpt_cm_req_recv() (git-fixes).\n- Re-enable yenta socket driver for x86_64 (bsc#1186349)\n- SUNRPC in case of backlog, hand free slots directly to waiting task (bsc#1185428).\n- SUNRPC: More fixes for backlog congestion (bsc#1185428).\n- USB: Add LPM quirk for Lenovo ThinkPad USB-C Dock Gen2 Ethernet (git-fixes).\n- USB: Add reset-resume quirk for WD19\u0027s Realtek Hub (git-fixes).\n- USB: CDC-ACM: fix poison/unpoison imbalance (bsc#1184984).\n- USB: CDC-ACM: fix poison/unpoison imbalance (git-fixes).\n- USB: cdc-acm: downgrade message to debug (git-fixes).\n- USB: cdc-acm: fix TIOCGSERIAL implementation (git-fixes).\n- USB: cdc-acm: fix double free on probe failure (git-fixes).\n- USB: cdc-acm: fix unprivileged TIOCCSERIAL (git-fixes).\n- USB: cdc-acm: fix use-after-free after probe failure (git-fixes).\n- USB: cdc-acm: untangle a circular dependency between callback and softint (git-fixes).\n- USB: gadget: u_ether: Fix a configfs return code (git-fixes).\n- USB: gadget: udc: fix wrong pointer passed to IS_ERR() and PTR_ERR() (git-fixes).\n- USB: quirks: ignore remote wake-up on Fibocom L850-GL LTE modem (git-fixes).\n- USB: replace hardcode maximum usb string length by definition (git-fixes).\n- USB: serial: ark3116: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: ch341: add new Product ID (git-fixes).\n- USB: serial: cp210x: add ID for Acuity Brands nLight Air Adapter (git-fixes).\n- USB: serial: cp210x: add some more GE USB IDs (git-fixes).\n- USB: serial: f81232: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: f81534: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: fix return value for unsupported ioctls (git-fixes).\n- USB: serial: io_edgeport: fix memory leak in edge_startup (git-fixes).\n- USB: serial: mos7720: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: opticon: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: pl2303: add support for PL2303HXN (bsc#1186320).\n- USB: serial: pl2303: fix line-speed handling on newer chips (bsc#1186320).\n- USB: serial: quatech2: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: ssu100: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: ti_usb_3410_5052: fix TIOCSSERIAL permission check (git-fixes).\n- USB: serial: usb_wwan: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: usb_wwan: fix TIOCSSERIAL jiffies conversions (git-fixes).\n- USB: serial: usb_wwan: fix unprivileged TIOCCSERIAL (git-fixes).\n- USB: trancevibrator: fix control-request direction (git-fixes).\n- USB: usblp: fix a hang in poll() if disconnected (git-fixes).\n- Update config files. (bsc#1185010)\n- amd/amdgpu: Disable VCN DPG mode for Picasso (git-fixes).\n- amdgpu: avoid incorrect %hu format string (git-fixes).\n- apparmor: Fix aa_label refcnt leak in policy_update (git-fixes).\n- apparmor: check/put label on apparmor_sk_clone_security() (git-fixes).\n- appletalk: Fix skb allocation size in loopback case (git-fixes).\n- arm64/mm: Fix pfn_valid() for ZONE_DEVICE based memory (git-fixes).\n- arm64: Add missing ISB after invalidating TLB in __primary_switch (git-fixes).\n- arm64: avoid -Woverride-init warning (git-fixes).\n- arm64: kasan: fix page_alloc tagging with DEBUG_VIRTUAL (git-fixes).\n- arm64: kdump: update ppos when reading elfcorehdr (git-fixes).\n- arm64: kexec_file: fix memory leakage in create_dtb() when fdt_open_into() fails (git-fixes).\n- arm64: link with -z norelro for LLD or aarch64-elf (git-fixes).\n- arm64: link with -z norelro regardless of CONFIG_RELOCATABLE (git-fixes).\n- arm64: make STACKPROTECTOR_PER_TASK configurable (bsc#1181862).\n- arm64: ptrace: Fix seccomp of traced syscall -1 (NO_SYSCALL) (git-fixes).\n- arm64: ptrace: Use NO_SYSCALL instead of -1 in syscall_trace_enter() (git-fixes).\n- arm64: vdso32: make vdso32 install conditional (git-fixes).\n- arm: mm: use __pfn_to_section() to get mem_section (git-fixes).\n- ata: ahci: Disable SXS for Hisilicon Kunpeng920 (git-fixes).\n- ata: libahci_platform: fix IRQ check (git-fixes).\n- ath10k: Fix a use after free in ath10k_htc_send_bundle (git-fixes).\n- ath10k: Fix ath10k_wmi_tlv_op_pull_peer_stats_info() unlock without lock (git-fixes).\n- ath10k: fix wmi mgmt tx queue full due to race condition (git-fixes).\n- ath10k: hold RCU lock when calling ieee80211_find_sta_by_ifaddr() (git-fixes).\n- ath9k: Fix error check in ath9k_hw_read_revisions() for PCI devices (git-fixes).\n- ath9k: fix transmitting to stations in dynamic SMPS mode (git-fixes).\n- atl1c: fix error return code in atl1c_probe() (git-fixes).\n- atl1e: fix error return code in atl1e_probe() (git-fixes).\n- backlight: journada720: Fix Wmisleading-indentation warning (git-fixes).\n- batman-adv: initialize \u0027struct batadv_tvlv_tt_vlan_data\u0027-\u003ereserved field (git-fixes).\n- binfmt_misc: fix possible deadlock in bm_register_write (git-fixes).\n- binfmt_misc: fix possible deadlock in bm_register_write (git-fixes).\n- blk-iocost: ioc_pd_free() shouldn\u0027t assume irq disabled (git-fixes).\n- blk-mq: Swap two calls in blk_mq_exit_queue() (git-fixes).\n- blk-mq: plug request for shared sbitmap (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).\n- blk-mq: set default elevator as deadline in case of hctx shared tagset (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).\n- blkcg: fix memleak for iolatency (git-fixes).\n- block, bfq: set next_rq to waker_bfqq-\u003enext_rq in waker injection (bsc#1168838).\n- block/genhd: use atomic_t for disk_event-\u003eblock (bsc#1185497).\n- block: Fix three kernel-doc warnings (git-fixes).\n- block: fix get_max_io_size() (git-fixes).\n- block: recalculate segment count for multi-segment discards correctly (bsc#1184724).\n- block: rsxx: fix error return code of rsxx_pci_probe() (git-fixes).\n- block: rsxx: select CONFIG_CRC32 (git-fixes).\n- bluetooth: eliminate the potential race condition when removing the HCI controller (git-fixes).\n- bnxt_en: Fix RX consumer index logic in the error path (git-fixes).\n- bnxt_en: Fix RX consumer index logic in the error path (git-fixes).\n- bnxt_en: fix ternary sign extension bug in bnxt_show_temp() (git-fixes).\n- bnxt_en: reliably allocate IRQ table on reset to avoid crash (jsc#SLE-8371 bsc#1153274).\n- bnxt_en: reverse order of TX disable and carrier off (git-fixes).\n- bpf, sockmap: Fix sk-\u003eprot unhash op reset (bsc#1155518).\n- bpf,x64: Pad NOPs to make images converge more easily (bsc#1178163).\n- bpf: Add sanity check for upper ptr_limit (bsc#1183686 bsc#1183775).\n- bpf: Avoid warning when re-casting __bpf_call_base into __bpf_call_base_args (bsc#1155518).\n- bpf: Declare __bpf_free_used_maps() unconditionally (bsc#1155518).\n- bpf: Do not do bpf_cgroup_storage_set() for kuprobe/tp programs (bsc#1155518).\n- bpf: Enforce that struct_ops programs be GPL-only (bsc#1177028).\n- bpf: Fix 32 bit src register truncation on div/mod (bsc#1184170).\n- bpf: Fix an unitialized value in bpf_iter (bsc#1177028).\n- bpf: Fix leakage of uninitialized bpf stack under speculation (bsc#1155518).\n- bpf: Fix masking negation logic upon negative dst register (bsc#1155518).\n- bpf: Fix propagation of 32 bit unsigned bounds from 64 bit bounds (bsc#1177028).\n- bpf: Fix verifier jsgt branch analysis on max bound (bsc#1155518).\n- bpf: Refcount task stack in bpf_get_task_stack (bsc#1177028).\n- bpf: Remove MTU check in __bpf_skb_max_len (bsc#1155518).\n- bpf: Simplify alu_limit masking for pointer arithmetic (bsc#1183686 bsc#1183775).\n- bpf: link: Refuse non-O_RDWR flags in BPF_OBJ_GET (bsc#1177028).\n- bpf_lru_list: Read double-checked variable once without lock (bsc#1155518).\n- brcmfmac: Add DMI nvram filename quirk for Predia Basic tablet (git-fixes).\n- brcmfmac: Add DMI nvram filename quirk for Voyo winpad A15 tablet (git-fixes).\n- brcmfmac: clear EAP/association status bits on linkdown events (git-fixes).\n- bsg: free the request before return error code (git-fixes).\n- btrfs: abort the transaction if we fail to inc ref in btrfs_copy_root (bsc#1184217).\n- btrfs: always pin deleted leaves when there are active tree mod log users (bsc#1184224).\n- btrfs: fix exhaustion of the system chunk array due to concurrent allocations (bsc#1183386).\n- btrfs: fix extent buffer leak on failure to copy root (bsc#1184218).\n- btrfs: fix qgroup data rsv leak caused by falloc failure (bsc#1185549).\n- btrfs: fix race between swap file activation and snapshot creation (bsc#1185587).\n- btrfs: fix race between swap file activation and snapshot creation (bsc#1185587).\n- btrfs: fix race between transaction aborts and fsyncs leading to use-after-free (bsc#1186441).\n- btrfs: fix race between transaction aborts and fsyncs leading to use-after-free (bsc#1186441).\n- btrfs: fix race between writes to swap files and scrub (bsc#1185586).\n- btrfs: fix race between writes to swap files and scrub (bsc#1185586).\n- btrfs: fix race when cloning extent buffer during rewind of an old root (bsc#1184193).\n- btrfs: fix race when picking most recent mod log operation for an old root (bsc#1186439).\n- btrfs: fix race when picking most recent mod log operation for an old root (bsc#1186439).\n- btrfs: fix stale data exposure after cloning a hole with NO_HOLES enabled (bsc#1184220).\n- btrfs: fix subvolume/snapshot deletion not triggered on mount (bsc#1184219).\n- btrfs: track qgroup released data in own variable in insert_prealloc_file_extent (bsc#1185549).\n- bus: fsl-mc: add the dpdbg device type (bsc#1185670).\n- bus: fsl-mc: list more commands as accepted through the ioctl (bsc#1185670).\n- bus: omap_l3_noc: mark l3 irqs as IRQF_NO_THREAD (git-fixes).\n- bus: qcom: Put child node before return (git-fixes).\n- bus: ti-sysc: Fix warning on unbind if reset is not deasserted (git-fixes).\n- can: c_can: move runtime PM enable/disable to c_can_platform (git-fixes).\n- can: c_can_pci: c_can_pci_remove(): fix use-after-free (git-fixes).\n- can: flexcan: assert FRZ bit in flexcan_chip_freeze() (git-fixes).\n- can: flexcan: enable RX FIFO after FRZ/HALT valid (git-fixes).\n- can: flexcan: flexcan_chip_freeze(): fix chip freeze for missing bitrate (git-fixes).\n- can: flexcan: invoke flexcan_chip_freeze() to enter freeze mode (git-fixes).\n- can: m_can: m_can_do_rx_poll(): fix extraneous msg loss warning (git-fixes).\n- can: peak_usb: Revert \u0027can: peak_usb: add forgotten supported devices\u0027 (git-fixes).\n- can: peak_usb: add forgotten supported devices (git-fixes).\n- can: skb: can_skb_set_owner(): fix ref counting if socket was closed before setting skb ownership (git-fixes).\n- cdc-acm: fix BREAK rx code path adding necessary calls (git-fixes).\n- cdc-wdm: untangle a circular dependency between callback and softint (git-fixes).\n- cdrom: gdrom: deallocate struct gdrom_unit fields in remove_gdrom (git-fixes).\n- cdrom: gdrom: initialize global variable at init time (git-fixes).\n- ceph: do not clobber i_snap_caps on non-I_NEW inode (bsc#1186501).\n- ceph: do not clobber i_snap_caps on non-I_NEW inode (bsc#1186501).\n- ceph: fix inode leak on getattr error in __fh_to_dentry (bsc#1186501).\n- ceph: fix inode leak on getattr error in __fh_to_dentry (bsc#1186501).\n- ceph: fix up error handling with snapdirs (bsc#1186501).\n- ceph: fix up error handling with snapdirs (bsc#1186501).\n- ceph: only check pool permissions for regular files (bsc#1186501).\n- ceph: only check pool permissions for regular files (bsc#1186501).\n- cfg80211: remove WARN_ON() in cfg80211_sme_connect (git-fixes).\n- cfg80211: scan: drop entry from hidden_list on overflow (git-fixes).\n- ch_ktls: Fix kernel panic (jsc#SLE-15131).\n- ch_ktls: do not send snd_una update to TCB in middle (jsc#SLE-15131).\n- ch_ktls: fix device connection close (jsc#SLE-15131).\n- ch_ktls: fix enum-conversion warning (jsc#SLE-15129).\n- ch_ktls: tcb close causes tls connection failure (jsc#SLE-15131).\n- cifs: New optype for session operations (bsc#1181507).\n- cifs: Tracepoints and logs for tracing credit changes (bsc#1181507).\n- cifs: change noisy error message to FYI (bsc#1181507).\n- cifs: check pointer before freeing (bsc#1183534).\n- cifs: do not send close in compound create+close requests (bsc#1181507).\n- cifs: print MIDs in decimal notation (bsc#1181507).\n- cifs: return proper error code in statfs(2) (bsc#1181507).\n- cifs_debug: use %pd instead of messing with -\u003ed_name (bsc#1181507).\n- clk: exynos7: Mark aclk_fsys1_200 as critical (git-fixes).\n- clk: fix invalid usage of list cursor in register (git-fixes).\n- clk: fix invalid usage of list cursor in unregister (git-fixes).\n- clk: mvebu: armada-37xx-periph: Fix switching CPU freq from 250 Mhz to 1 GHz (git-fixes).\n- clk: mvebu: armada-37xx-periph: Fix workaround for switching from L1 to L0 (git-fixes).\n- clk: mvebu: armada-37xx-periph: remove .set_parent method for CPU PM clock (git-fixes).\n- clk: qcom: a53-pll: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- clk: socfpga: arria10: Fix memory leak of socfpga_clk on error return (git-fixes).\n- clk: socfpga: fix iomem pointer cast on 64-bit (git-fixes).\n- clk: uniphier: Fix potential infinite loop (git-fixes).\n- clk: zynqmp: move zynqmp_pll_set_mode out of round_rate callback (git-fixes).\n- completion: Drop init_completion define (git-fixes).\n- configfs: fix a use-after-free in __configfs_open_file (git-fixes).\n- coresight: etm4x: Fix issues on trcseqevr access (git-fixes).\n- coresight: etm4x: Fix save and restore of TRCVMIDCCTLR1 register (git-fixes).\n- coresight: remove broken __exit annotations (git-fixes).\n- coresight: tmc-etr: Fix barrier packet insertion for perf buffer (git-fixes).\n- cpufreq: Kconfig: fix documentation links (git-fixes).\n- cpufreq: armada-37xx: Fix determining base CPU frequency (git-fixes).\n- cpufreq: armada-37xx: Fix driver cleanup when registration failed (git-fixes).\n- cpufreq: armada-37xx: Fix setting TBG parent for load levels (git-fixes).\n- cpufreq: armada-37xx: Fix the AVS value for load L1 (git-fixes).\n- cpufreq: intel_pstate: Add Icelake servers support in no-HWP mode (bsc#1185758).\n- cpuidle/pseries: Fixup CEDE0 latency only for POWER10 onwards (bsc#1185550 ltc#192610).\n- crypto: api - check for ERR pointers in crypto_destroy_tfm() (git-fixes).\n- crypto: arm/curve25519 - Move \u0027.fpu\u0027 after \u0027.arch\u0027 (git-fixes).\n- crypto: chelsio - Read rxchannel-id from firmware (git-fixes).\n- crypto: mips/poly1305 - enable for all MIPS processors (git-fixes).\n- crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init (git-fixes).\n- crypto: qat - Fix a double free in adf_create_ring (git-fixes).\n- crypto: qat - do not release uninitialized resources (git-fixes).\n- crypto: qat - fix error path in adf_isr_resource_alloc() (git-fixes).\n- crypto: qat - fix unmap invalid dma address (git-fixes).\n- crypto: rng - fix crypto_rng_reset() refcounting when !CRYPTO_STATS (git-fixes).\n- crypto: stm32/cryp - Fix PM reference leak on stm32-cryp.c (git-fixes).\n- crypto: stm32/hash - Fix PM reference leak on stm32-hash.c (git-fixes).\n- crypto: tcrypt - avoid signed overflow in byte count (git-fixes).\n- cxgb4/chtls/cxgbit: Keeping the max ofld immediate data size same in cxgb4 and ulds (git-fixes).\n- cxgb4/chtls/cxgbit: Keeping the max ofld immediate data size same in cxgb4 and ulds (git-fixes).\n- cxgb4: Fix unintentional sign extension issues (git-fixes).\n- cxgb4: avoid collecting SGE_QBASE regs during traffic (git-fixes).\n- dm era: Fix bitset memory leaks (git-fixes).\n- dm era: Recover committed writeset after crash (git-fixes).\n- dm era: Reinitialize bitset cache before digesting a new writeset (git-fixes).\n- dm era: Update in-core bitset after committing the metadata (git-fixes).\n- dm era: Use correct value size in equality function of writeset tree (git-fixes).\n- dm era: Verify the data block size hasn\u0027t changed (git-fixes).\n- dm era: only resize metadata in preresume (git-fixes).\n- dm integrity: fix error reporting in bitmap mode after creation (git-fixes).\n- dm ioctl: fix error return code in target_message (git-fixes).\n- dm mpath: fix racey management of PG initialization (git-fixes).\n- dm mpath: switch paths in dm_blk_ioctl() code path (bsc#1167574, bsc#1175995, bsc#1184485).\n- dm raid: fix discard limits for raid1 (git-fixes).\n- dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails (bsc#1185581).\n- dm writecache: fix the maximum number of arguments (git-fixes).\n- dm writecache: handle DAX to partitions on persistent memory correctly (git-fixes).\n- dm writecache: remove BUG() and fail gracefully instead (git-fixes).\n- dm zoned: select CONFIG_CRC32 (git-fixes).\n- dm: avoid filesystem lookup in dm_get_dev_t() (git-fixes).\n- dm: eliminate potential source of excessive kernel log noise (git-fixes).\n- dm: fix bug with RCU locking in dm_blk_report_zones (git-fixes).\n- dm: remove invalid sparse __acquires and __releases annotations (git-fixes).\n- dmaengine: Fix a double free in dma_async_device_register (git-fixes).\n- dmaengine: dw-edma: Fix crash on loading/unloading driver (git-fixes).\n- dmaengine: dw: Make it dependent to HAS_IOMEM (git-fixes).\n- dmaengine: idxd: Fix clobbering of SWERR overflow bit on writeback (git-fixes).\n- dmaengine: idxd: Fix potential null dereference on pointer status (git-fixes).\n- dmaengine: idxd: cleanup pci interrupt vector allocation management (git-fixes).\n- dmaengine: idxd: clear MSIX permission entry on shutdown (git-fixes).\n- dmaengine: idxd: fix cdev setup and free device lifetime issues (git-fixes).\n- dmaengine: idxd: fix delta_rec and crc size field for completion record (git-fixes).\n- dmaengine: idxd: fix dma device lifetime (git-fixes).\n- dmaengine: idxd: fix opcap sysfs attribute output (git-fixes).\n- dmaengine: idxd: fix wq cleanup of WQCFG registers (git-fixes).\n- dmaengine: idxd: fix wq size store permission state (git-fixes).\n- dmaengine: idxd: removal of pcim managed mmio mapping (git-fixes).\n- docs: kernel-parameters: Add gpio_mockup_named_lines (git-fixes).\n- docs: kernel-parameters: Move gpio-mockup for alphabetic order (git-fixes).\n- dpaa_eth: Remove unnecessary boolean expression in dpaa_get_headroom (git-fixes).\n- dpaa_eth: Use random MAC address when none is given (bsc#1184811).\n- dpaa_eth: copy timestamp fields to new skb in A-050385 workaround (git-fixes).\n- dpaa_eth: fix the RX headroom size alignment (git-fixes).\n- dpaa_eth: update the buffer layout for non-A050385 erratum scenarios (git-fixes).\n- drivers: hv: Fix whitespace errors (bsc#1185725).\n- drivers: net: xgene: Fix the order of the arguments of \u0027alloc_etherdev_mqs()\u0027 (git-fixes).\n- drivers: video: fbcon: fix NULL dereference in fbcon_cursor() (git-fixes).\n- drivers: video: fbcon: fix NULL dereference in fbcon_cursor() (git-fixes).\n- drm/amd/display/dc/dce/dce_aux: Remove duplicate line causing \u0027field overwritten\u0027 issue (git-fixes).\n- drm/amd/display: Check for DSC support instead of ASIC revision (git-fixes).\n- drm/amd/display: Correct algorithm for reversed gamma (git-fixes).\n- drm/amd/display: DCHUB underflow counter increasing in some scenarios (git-fixes).\n- drm/amd/display: Do not optimize bandwidth before disabling planes (git-fixes).\n- drm/amd/display: Fix UBSAN warning for not a valid value for type \u0027_Bool\u0027 (git-fixes).\n- drm/amd/display: Fix UBSAN: shift-out-of-bounds warning (git-fixes).\n- drm/amd/display: Fix debugfs link_settings entry (git-fixes).\n- drm/amd/display: Fix nested FPU context in dcn21_validate_bandwidth() (git-fixes).\n- drm/amd/display: Fix off by one in hdmi_14_process_transaction() (git-fixes).\n- drm/amd/display: Fix two cursor duplication when using overlay (git-fixes).\n- drm/amd/display: Force vsync flip when reconfiguring MPCC (git-fixes).\n- drm/amd/display: Guard against NULL pointer deref when get_i2c_info fails (git-fixes).\n- drm/amd/display: Initialize attribute for hdcp_srm sysfs file (git-fixes).\n- drm/amd/display: Reject non-zero src_y and src_x for video planes (git-fixes).\n- drm/amd/display: Revert dram_clock_change_latency for DCN2.1 (git-fixes).\n- drm/amd/display: Try YCbCr420 color when YCbCr444 fails (git-fixes).\n- drm/amd/display: add handling for hdcp2 rx id list validation (git-fixes).\n- drm/amd/display: changing sr exit latency (git-fixes).\n- drm/amd/display: fix dml prefetch validation (git-fixes).\n- drm/amd/display: fixed divide by zero kernel crash during dsc enablement (git-fixes).\n- drm/amd/display: turn DPMS off on connector unplug (git-fixes).\n- drm/amd/pm: fix workload mismatch on vega10 (git-fixes).\n- drm/amd/powerplay: fix spelling mistake \u0027smu_state_memroy_block\u0027 (bsc#1152489) \n- drm/amdgpu : Fix asic reset regression issue introduce by 8f211fe8ac7c4f (git-fixes).\n- drm/amdgpu/display/dm: add missing parameter documentation (git-fixes).\n- drm/amdgpu/display: buffer INTERRUPT_LOW_IRQ_CONTEXT interrupt work (git-fixes).\n- drm/amdgpu/display: remove redundant continue statement (git-fixes).\n- drm/amdgpu/display: restore AUX_DPHY_TX_CONTROL for DCN2.x (git-fixes).\n- drm/amdgpu/display: use GFP_ATOMIC in dcn21_validate_bandwidth_fp() (git-fixes).\n- drm/amdgpu/swsmu: add interrupt work function (git-fixes).\n- drm/amdgpu/swsmu: add interrupt work handler for smu11 parts (git-fixes).\n- drm/amdgpu: Add additional Sienna Cichlid PCI ID (git-fixes).\n- drm/amdgpu: Add check to prevent IH overflow (git-fixes).\n- drm/amdgpu: Add mem sync flag for IB allocated by SA (git-fixes).\n- drm/amdgpu: Fix GPU TLB update error when PAGE_SIZE \u003e AMDGPU_PAGE_SIZE (git-fixes).\n- drm/amdgpu: Fix some unload driver issues (git-fixes).\n- drm/amdgpu: Init GFX10_ADDR_CONFIG for VCN v3 in DPG mode (git-fixes).\n- drm/amdgpu: check alignment on CPU page for bo map (git-fixes).\n- drm/amdgpu: disable 3DCGCG on picasso/raven1 to avoid compute hang (git-fixes).\n- drm/amdgpu: fb BO should be ttm_bo_type_device (git-fixes).\n- drm/amdgpu: fix NULL pointer dereference (git-fixes).\n- drm/amdgpu: fix concurrent VM flushes on Vega/Navi v2 (git-fixes).\n- drm/amdgpu: fix offset calculation in amdgpu_vm_bo_clear_mappings() (git-fixes).\n- drm/amdgpu: fix parameter error of RREG32_PCIE() in amdgpu_regs_pcie (git-fixes).\n- drm/amdgpu: mask the xgmi number of hops reported from psp to kfd (git-fixes).\n- drm/amdgpu: remove unused variable from struct amdgpu_bo (git-fixes).\n- drm/amdgpu: update gc golden setting for Navi12 (git-fixes).\n- drm/amdgpu: update sdma golden setting for Navi12 (git-fixes).\n- drm/amdkfd: Fix UBSAN shift-out-of-bounds warning (git-fixes).\n- drm/amdkfd: Fix cat debugfs hang_hws file causes system crash bug (git-fixes).\n- drm/amdkfd: Put ACPI table after using it (bsc#1152489) Backporting notes: \t* context changes\n- drm/amdkfd: dqm fence memory corruption (git-fixes).\n- drm/amdkfd: fix build error with AMD_IOMMU_V2=m (git-fixes).\n- drm/ast: AST2500 fixups (bsc#1174416).\n- drm/ast: AST2500 fixups (bsc#1174416).\n- drm/ast: Add 25MHz refclk support (bsc#1174416).\n- drm/ast: Add 25MHz refclk support (bsc#1174416).\n- drm/ast: Add support for 1152x864 mode (bsc#1174416).\n- drm/ast: Add support for 1152x864 mode (bsc#1174416).\n- drm/ast: Add support for AIP200 (bsc#1174416).\n- drm/ast: Add support for AIP200 (bsc#1174416).\n- drm/ast: Correct mode table for AST2500 precatch (bsc#1174416).\n- drm/ast: Correct mode table for AST2500 precatch (bsc#1174416).\n- drm/ast: Disable VGA decoding while driver is active (bsc#1174416).\n- drm/ast: Disable VGA decoding while driver is active (bsc#1174416).\n- drm/ast: Disable screen on register init (bsc#1174416).\n- drm/ast: Disable screen on register init (bsc#1174416).\n- drm/ast: Fix P2A config detection (bsc#1174416).\n- drm/ast: Fix P2A config detection (bsc#1174416).\n- drm/ast: Fix invalid usage of AST_MAX_HWC_WIDTH in cursor atomic_check (git-fixes).\n- drm/ast: Fix register access in non-P2A mode for DP501 (bsc#1174416).\n- drm/ast: Fix register access in non-P2A mode for DP501 (bsc#1174416).\n- drm/ast: Keep MISC fields when enabling VGA (bsc#1174416).\n- drm/ast: Keep MISC fields when enabling VGA (bsc#1174416).\n- drm/ast: drm/ast: Fix boot address for AST2500 (bsc#1174416).\n- drm/ast: drm/ast: Fix boot address for AST2500 (bsc#1174416).\n- drm/compat: Clear bounce structures (git-fixes).\n- drm/dp_mst: Revise broadcast msg lct \u0026 lcr (git-fixes).\n- drm/dp_mst: Set CLEAR_PAYLOAD_ID_TABLE as broadcast (git-fixes).\n- drm/hisilicon: Fix use-after-free (git-fixes).\n- drm/i915/display: fix compiler warning about array overrun (git-fixes).\n- drm/i915/gt: Clear CACHE_MODE prior to clearing residuals (git-fixes).\n- drm/i915/gt: Disable HiZ Raw Stall Optimization on broken gen7 (git-fixes).\n- drm/i915/gvt: Fix error code in intel_gvt_init_device() (git-fixes).\n- drm/i915/gvt: Set SNOOP for PAT3 on BXT/APL to workaround GPU BB hang (git-fixes).\n- drm/i915/overlay: Fix active retire callback alignment (git-fixes).\n- drm/i915/selftests: Fix some error codes (git-fixes).\n- drm/i915: Avoid div-by-zero on gen2 (git-fixes).\n- drm/i915: Fix ICL MG PHY vswing handling (git-fixes).\n- drm/i915: Fix crash in auto_retire (git-fixes).\n- drm/i915: Fix invalid access to ACPI _DSM objects (bsc#1184074).\n- drm/i915: Hold onto an explicit ref to i915_vma_work.pinned (git-fixes).\n- drm/i915: Read C0DRB3/C1DRB3 as 16 bits again (git-fixes).\n- drm/i915: Wedge the GPU if command parser setup fails (git-fixes).\n- drm/imx: imx-ldb: fix out of bounds array access warning (git-fixes).\n- drm/ingenic: Fix non-OSD mode (git-fixes).\n- drm/ingenic: Register devm action to cleanup encoders (git-fixes).\n- drm/komeda: Fix bit check to import to value of proper type (git-fixes).\n- drm/lima: fix reference leak in lima_pm_busy (git-fixes).\n- drm/mcde/panel: Inverse misunderstood flag (git-fixes).\n- drm/mediatek: Fix aal size config (bsc#1152489) Backporting notes: \t* replaced mtk_ddp_write() with writel()\n- drm/meson: fix shutdown crash when component not probed (git-fixes).\n- drm/msm/a5xx: Remove overwriting A5XX_PC_DBG_ECO_CNTL register (git-fixes).\n- drm/msm/adreno: a5xx_power: Do not apply A540 lm_setup to other GPUs (git-fixes).\n- drm/msm/gem: Add obj-\u003elock wrappers (bsc#1152489) Backporting notes: \t* taken for 9b73bde39cf2 (\u0027drm/msm: Fix use-after-free in msm_gem with carveout\u0027) \t* context changes\n- drm/msm/mdp5: Configure PP_SYNC_HEIGHT to double the vtotal (git-fixes).\n- drm/msm/mdp5: Do not multiply vclk line count by 100 (git-fixes).\n- drm/msm: Fix WARN_ON() splat in _free_object() (bsc#1152489) Backporting notes: \t* context changes\n- drm/msm: Fix a5xx/a6xx timestamps (git-fixes).\n- drm/msm: Fix races managing the OOB state for timestamp vs (bsc#1152489) Backporting notes: \t* context changes\n- drm/msm: Fix suspend/resume on i.MX5 (git-fixes).\n- drm/msm: Fix use-after-free in msm_gem with carveout (bsc#1152489) Backporting notes: \t* context changes\n- drm/msm: Ratelimit invalid-fence message (git-fixes).\n- drm/msm: Set drvdata to NULL when msm_drm_init() fails (git-fixes).\n- drm/msm: fix shutdown hook in case GPU components failed to bind (git-fixes).\n- drm/nouveau/kms/nv50-: Get rid of bogus nouveau_conn_mode_valid() (git-fixes).\n- drm/nouveau: bail out of nouveau_channel_new if channel init fails (bsc#1152489)\n- drm/omap: fix misleading indentation in pixinc() (git-fixes).\n- drm/panfrost: Clear MMU irqs before handling the fault (git-fixes).\n- drm/panfrost: Do not corrupt the queue mutex on open/close (bsc#1152472) Backporting notes: \t* context changes\n- drm/panfrost: Do not try to map pages that are already mapped (git-fixes).\n- drm/panfrost: Fix job timeout handling (bsc#1152472) Backporting notes: \t* context changes\n- drm/panfrost: Remove unused variables in panfrost_job_close() (bsc#1152472)\n- drm/probe-helper: Check epoch counter in output_poll_execute() (git-fixes).\n- drm/qxl: do not run release if qxl failed to init (git-fixes).\n- drm/radeon/dpm: Disable sclk switching on Oland when two 4K 60Hz monitors are connected (git-fixes).\n- drm/radeon: Avoid power table parsing memory leaks (git-fixes).\n- drm/radeon: Fix a missing check bug in radeon_dp_mst_detect() (git-fixes).\n- drm/radeon: Fix off-by-one power_state index heap overwrite (git-fixes).\n- drm/radeon: fix AGP dependency (git-fixes).\n- drm/radeon: fix copy of uninitialized variable back to userspace (git-fixes).\n- drm/shmem-helper: Check for purged buffers in fault handler (git-fixes).\n- drm/shmem-helper: Do not remove the offset in vm_area_struct pgoff (git-fixes).\n- drm/shmem-helpers: vunmap: Do not put pages for dma-buf (git-fixes).\n- drm/sun4i: tcon: fix inverted DCLK polarity (bsc#1152489) Backporting notes: \t* context changes\n- drm/tegra: Fix reference leak when pm_runtime_get_sync() fails (git-fixes).\n- drm/tegra: dc: Do not set PLL clock to 0Hz (git-fixes).\n- drm/tegra: dc: Restore coupling of display controllers (git-fixes).\n- drm/tegra: sor: Grab runtime PM reference across reset (git-fixes).\n- drm/tilcdc: send vblank event when disabling crtc (git-fixes).\n- drm/vc4: crtc: Reduce PV fifo threshold on hvs4 (git-fixes).\n- drm/vc4: hdmi: Restore cec physical address on reconnect (bsc#1152472) Backporting notes: \t* context changes \t* change vc4_hdmi to vc4-\u003ehdmi \t* removed references to encoder-\u003ehdmi_monitor\n- drm/vkms: fix misuse of WARN_ON (git-fixes).\n- drm: Added orientation quirk for OneGX1 Pro (git-fixes).\n- drm: meson_drv add shutdown function (git-fixes).\n- drm: rcar-du: Fix PM reference leak in rcar_cmm_enable() (git-fixes).\n- drm: rcar-du: Fix crash when using LVDS1 clock for CRTC (bsc#1152489) Backporting notes: \t* context changes\n- drm: rcar-du: Fix leak of CMM platform device reference (git-fixes).\n- drm: xlnx: zynqmp: fix a memset in zynqmp_dp_train() (git-fixes).\n- e1000e: Fix duplicate include guard (git-fixes).\n- e1000e: Fix error handling in e1000_set_d0_lplu_state_82571 (git-fixes).\n- e1000e: add rtnl_lock() to e1000_reset_task (git-fixes).\n- efi: use 32-bit alignment for efi_guid_t literals (git-fixes).\n- enetc: Fix reporting of h/w packet counters (git-fixes).\n- enetc: Let the hardware auto-advance the taprio base-time of 0 (git-fixes).\n- enetc: Workaround for MDIO register access issue (git-fixes).\n- epoll: check for events when removing a timed out thread from the wait queue (git-fixes).\n- ethernet/netronome/nfp: Fix a use after free in nfp_bpf_ctrl_msg_rx (git-fixes).\n- ethernet: alx: fix order of calls on resume (git-fixes).\n- ethernet:enic: Fix a use after free bug in enic_hard_start_xmit (git-fixes).\n- ethtool: fix incorrect datatype in set_eee ops (bsc#1176447).\n- ethtool: fix missing NLM_F_MULTI flag when dumping (bsc#1176447).\n- ethtool: pause: make sure we init driver stats (jsc#SLE-15075).\n- exec: Move would_dump into flush_old_exec (git-fixes).\n- ext4: do not try to set xattr into ea_inode if value is empty (bsc#1184730).\n- ext4: find old entry again if failed to rename whiteout (bsc#1184742).\n- ext4: fix potential error in ext4_do_update_inode (bsc#1184731).\n- ext4: fix potential htree index checksum corruption (bsc#1184728).\n- extcon: Add stubs for extcon_register_notifier_all() functions (git-fixes).\n- extcon: Fix error handling in extcon_dev_register (git-fixes).\n- extcon: arizona: Fix some issues when HPDET IRQ fires after the jack has been unplugged (git-fixes).\n- extcon: arizona: Fix various races on driver unbind (git-fixes).\n- fbdev: zero-fill colormap in fbcmap.c (git-fixes).\n- fbmem: add margin check to fb_check_caps() (git-fixes).\n- firmware/efi: Fix a use after bug in efi_mem_reserve_persistent (git-fixes).\n- firmware: arm_scpi: Prevent the ternary sign expansion bug (git-fixes).\n- firmware: qcom-scm: Fix QCOM_SCM configuration (git-fixes).\n- firmware: qcom_scm: Fix kernel-doc function names to match (git-fixes).\n- firmware: qcom_scm: Make __qcom_scm_is_call_available() return bool (git-fixes).\n- firmware: qcom_scm: Reduce locking section for __get_convention() (git-fixes).\n- firmware: qcom_scm: Workaround lack of \u0027is available\u0027 call on SC7180 (git-fixes).\n- flow_dissector: fix byteorder of dissected ICMP ID (bsc#1154353).\n- fnic: use scsi_host_busy_iter() to traverse commands (bsc#1179851).\n- fotg210-udc: Complete OUT requests on short packets (git-fixes).\n- fotg210-udc: Do not DMA more than the buffer can take (git-fixes).\n- fotg210-udc: Fix DMA on EP0 for length \u003e max packet size (git-fixes).\n- fotg210-udc: Fix EP0 IN requests bigger than two packets (git-fixes).\n- fotg210-udc: Mask GRP2 interrupts we do not handle (git-fixes).\n- fotg210-udc: Remove a dubious condition leading to fotg210_done (git-fixes).\n- fs/epoll: restore waking from ep_done_scan() (bsc#1183868).\n- fs/jfs: fix potential integer overflow on shift of a int (bsc#1184741).\n- fs: direct-io: fix missing sdio-\u003eboundary (bsc#1184736).\n- fsl/fman: check dereferencing null pointer (git-fixes).\n- fsl/fman: fix dereference null return value (git-fixes).\n- fsl/fman: fix eth hash table allocation (git-fixes).\n- fsl/fman: fix unreachable code (git-fixes).\n- fsl/fman: reuse set_mac_address() in dtsec init() (bsc#1184811).\n- fsl/fman: tolerate missing MAC address in device tree (bsc#1184811).\n- fsl/fman: use 32-bit unsigned integer (git-fixes).\n- ftrace/x86: Tell objtool to ignore nondeterministic ftrace stack layout (bsc#1177028).\n- ftrace: Fix modify_ftrace_direct (bsc#1177028).\n- ftrace: Handle commands when closing set_ftrace_filter file (git-fixes).\n- fuse: fix bad inode (bsc#1184211).\n- fuse: fix bad inode (bsc#1184211).\n- fuse: fix live lock in fuse_iget() (bsc#1184211).\n- fuse: fix live lock in fuse_iget() (bsc#1184211).\n- fuse: fix write deadlock (bsc#1185573).\n- fuse: verify write return (git-fixes).\n- futex: Change utime parameter to be \u0027const ... *\u0027 (git-fixes).\n- futex: Do not apply time namespace adjustment on FUTEX_LOCK_PI (bsc#1164648).\n- futex: Get rid of the val2 conditional dance (git-fixes).\n- futex: Make syscall entry points less convoluted (git-fixes).\n- gcc-plugins: drop support for GCC \u0026lt;= 4.7 (bcs#1181862).\n- gcc-plugins: make it possible to disable CONFIG_GCC_PLUGINS again (bcs#1181862).\n- gcc-plugins: simplify GCC plugin-dev capability test (bsc#1181862).\n- geneve: do not modify the shared tunnel info when PMTU triggers an ICMP reply (bsc#1176447).\n- geneve: do not modify the shared tunnel info when PMTU triggers an ICMP reply (git-fixes).\n- genirq/irqdomain: Do not try to free an interrupt that has no (git-fixes)\n- genirq: Disable interrupts for force threaded handlers (git-fixes)\n- genirq: Reduce irqdebug cacheline bouncing (bsc#1185703 ltc#192641).\n- gianfar: Account for Tx PTP timestamp in the skb headroom (git-fixes).\n- gianfar: Fix TX timestamping with a stacked DSA driver (git-fixes).\n- gianfar: Handle error code at MAC address change (git-fixes).\n- gianfar: Replace skb_realloc_headroom with skb_cow_head for PTP (git-fixes).\n- gpio: omap: Save and restore sysconfig (git-fixes).\n- gpio: pca953x: Set IRQ type when handle Intel Galileo Gen 2 (git-fixes).\n- gpio: sysfs: Obey valid_mask (git-fixes).\n- gpio: xilinx: Correct kernel doc for xgpio_probe() (git-fixes).\n- gpio: zynq: fix reference leak in zynq_gpio functions (git-fixes).\n- gpiolib: Do not free if pin ranges are not defined (git-fixes).\n- gpiolib: acpi: Add missing IRQF_ONESHOT (git-fixes).\n- gpiolib: acpi: Add quirk to ignore EC wakeups on Dell Venue 10 Pro 5055 (git-fixes).\n- gpu/xen: Fix a use after free in xen_drm_drv_init (git-fixes).\n- hrtimer: Update softirq_expires_next correctly after (git-fixes)\n- hv_netvsc: Reset the RSC count if NVSP_STAT_FAIL in netvsc_receive() (git-fixes).\n- hwmon: (ina3221) Fix PM usage counter unbalance in ina3221_write_enable (git-fixes).\n- hwmon: (occ) Fix poll rate limiting (git-fixes).\n- i2c: Add I2C_AQ_NO_REP_START adapter quirk (git-fixes).\n- i2c: bail out early when RDWR parameters are wrong (git-fixes).\n- i2c: cadence: add IRQ check (git-fixes).\n- i2c: emev2: add IRQ check (git-fixes).\n- i2c: i801: Do not generate an interrupt on bus reset (git-fixes).\n- i2c: img-scb: fix reference leak when pm_runtime_get_sync fails (git-fixes).\n- i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails (git-fixes).\n- i2c: jz4780: add IRQ check (git-fixes).\n- i2c: mlxbf: add IRQ check (git-fixes).\n- i2c: omap: fix reference leak when pm_runtime_get_sync fails (git-fixes).\n- i2c: rcar: faster irq code to minimize HW race condition (git-fixes).\n- i2c: rcar: optimize cacheline to minimize HW race condition (git-fixes).\n- i2c: s3c2410: fix possible NULL pointer deref on read message after write (git-fixes).\n- i2c: sh7760: add IRQ check (git-fixes).\n- i2c: sh7760: fix IRQ error path (git-fixes).\n- i2c: sh_mobile: Use new clock calculation formulas for RZ/G2E (git-fixes).\n- i2c: sprd: fix reference leak when pm_runtime_get_sync fails (git-fixes).\n- i2c: tegra: Add missing pm_runtime_put() (bsc#1184386).\n- i2c: tegra: Check errors for both positive and negative values (bsc#1184386).\n- i2c: tegra: Clean up and improve comments (bsc#1184386).\n- i2c: tegra: Clean up printk messages (bsc#1184386).\n- i2c: tegra: Clean up probe function (bsc#1184386).\n- i2c: tegra: Clean up variable names (bsc#1184386).\n- i2c: tegra: Clean up variable types (bsc#1184386).\n- i2c: tegra: Clean up whitespaces, newlines and indentation (bsc#1184386).\n- i2c: tegra: Create i2c_writesl_vi() to use with VI I2C for filling TX FIFO (bsc#1184386).\n- i2c: tegra: Factor out error recovery from tegra_i2c_xfer_msg() (bsc#1184386).\n- i2c: tegra: Factor out hardware initialization into separate function (bsc#1184386).\n- i2c: tegra: Factor out packet header setup from tegra_i2c_xfer_msg() (bsc#1184386).\n- i2c: tegra: Factor out register polling into separate function (bsc#1184386).\n- i2c: tegra: Handle potential error of tegra_i2c_flush_fifos() (bsc#1184386).\n- i2c: tegra: Improve driver module description (bsc#1184386).\n- i2c: tegra: Improve formatting of variables (bsc#1184386).\n- i2c: tegra: Initialize div-clk rate unconditionally (bsc#1184386).\n- i2c: tegra: Make tegra_i2c_flush_fifos() usable in atomic transfer (bsc#1184386).\n- i2c: tegra: Mask interrupt in tegra_i2c_issue_bus_clear() (bsc#1184386).\n- i2c: tegra: Move out all device-tree parsing into tegra_i2c_parse_dt() (bsc#1184386).\n- i2c: tegra: Remove \u0027dma\u0027 variable from tegra_i2c_xfer_msg() (bsc#1184386).\n- i2c: tegra: Remove error message used for devm_request_irq() failure (bsc#1184386).\n- i2c: tegra: Remove i2c_dev.clk_divisor_non_hs_mode member (bsc#1184386).\n- i2c: tegra: Remove likely/unlikely from the code (bsc#1184386).\n- i2c: tegra: Remove outdated barrier() (bsc#1184386).\n- i2c: tegra: Remove redundant check in tegra_i2c_issue_bus_clear() (bsc#1184386).\n- i2c: tegra: Rename wait/poll functions (bsc#1184386).\n- i2c: tegra: Reorder location of functions in the code (bsc#1184386).\n- i2c: tegra: Runtime PM always available on Tegra (bsc#1184386).\n- i2c: tegra: Use clk-bulk helpers (bsc#1184386).\n- i2c: tegra: Use devm_platform_get_and_ioremap_resource() (bsc#1184386).\n- i2c: tegra: Use platform_get_irq() (bsc#1184386).\n- i2c: tegra: Use reset_control_reset() (bsc#1184386).\n- i2c: tegra: Use threaded interrupt (bsc#1184386).\n- i2c: tegra: Wait for config load atomically while in ISR (bsc#1184386).\n- i40e: Add zero-initialization of AQ command structures (git-fixes).\n- i40e: Added Asym_Pause to supported link modes (git-fixes).\n- i40e: Fix PHY type identifiers for 2.5G and 5G adapters (git-fixes).\n- i40e: Fix add TC filter for IPv6 (git-fixes).\n- i40e: Fix addition of RX filters after enabling FW LLDP agent (git-fixes).\n- i40e: Fix display statistics for veb_tc (git-fixes).\n- i40e: Fix endianness conversions (git-fixes).\n- i40e: Fix flow for IPv6 next header (extension header) (git-fixes).\n- i40e: Fix kernel oops when i40e driver removes VF\u0027s (git-fixes).\n- i40e: Fix overwriting flow control settings during driver loading (git-fixes).\n- i40e: Fix parameters in aq_get_phy_register() (jsc#SLE-8025).\n- i40e: Fix sparse error: \u0027vsi-\u003enetdev\u0027 could be null (jsc#SLE-8025).\n- i40e: Fix sparse error: uninitialized symbol \u0027ring\u0027 (jsc#SLE-13701).\n- i40e: Fix sparse errors in i40e_txrx.c (git-fixes).\n- i40e: Fix sparse errors in i40e_txrx.c (git-fixes).\n- i40e: Fix sparse warning: missing error code \u0027err\u0027 (git-fixes).\n- i40e: Fix use-after-free in i40e_client_subtask() (git-fixes).\n- i40e: fix broken XDP support (git-fixes).\n- i40e: fix the panic when running bpf in xdpdrv mode (git-fixes).\n- i40e: fix the restart auto-negotiation after FEC modified (git-fixes).\n- i915/perf: Start hrtimer only if sampling the OA buffer (git-fixes).\n- iavf: Fix incorrect adapter get in iavf_resume (git-fixes).\n- iavf: use generic power management (git-fixes).\n- ibmvfc: Avoid move login if fast fail is enabled (bsc#1185938 ltc#192043).\n- ibmvfc: Handle move login failure (bsc#1185938 ltc#192043).\n- ibmvfc: Reinit target retries (bsc#1185938 ltc#192043).\n- ibmvnic: add comments for spinlock_t definitions (bsc#1183871 ltc#192139).\n- ibmvnic: avoid calling napi_disable() twice (bsc#1065729).\n- ibmvnic: avoid multiple line dereference (bsc#1183871 ltc#192139).\n- ibmvnic: clean up the remaining debugfs data structures (bsc#1065729).\n- ibmvnic: correctly use dev_consume/free_skb_irq (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290 git-fixes).\n- ibmvnic: fix block comments (bsc#1183871 ltc#192139).\n- ibmvnic: fix braces (bsc#1183871 ltc#192139).\n- ibmvnic: fix miscellaneous checks (bsc#1183871 ltc#192139).\n- ibmvnic: improve failover sysfs entry (bsc#1043990 ltc#155681 git-fixes).\n- ibmvnic: merge do_change_param_reset into do_reset (bsc#1183871 ltc#192139).\n- ibmvnic: prefer \u0027unsigned long\u0027 over \u0027unsigned long int\u0027 (bsc#1183871 ltc#192139).\n- ibmvnic: prefer strscpy over strlcpy (bsc#1183871 ltc#192139).\n- ibmvnic: print adapter state as a string (bsc#1152457 ltc#174432 git-fixes).\n- ibmvnic: print reset reason as a string (bsc#1152457 ltc#174432 git-fixes).\n- ibmvnic: queue reset work in system_long_wq (bsc#1152457 ltc#174432 git-fixes).\n- ibmvnic: remove default label from to_string switch (bsc#1152457 ltc#174432 git-fixes).\n- ibmvnic: remove duplicate napi_schedule call in do_reset function (bsc#1065729).\n- ibmvnic: remove duplicate napi_schedule call in open function (bsc#1065729).\n- ibmvnic: remove unnecessary rmb() inside ibmvnic_poll (bsc#1183871 ltc#192139).\n- ibmvnic: remove unused spinlock_t stats_lock definition (bsc#1183871 ltc#192139).\n- ibmvnic: rework to ensure SCRQ entry reads are properly ordered (bsc#1183871 ltc#192139).\n- ice: Account for port VLAN in VF max packet size calculation (git-fixes).\n- ice: Account for port VLAN in VF max packet size calculation (git-fixes).\n- ice: Cleanup fltr list in case of allocation issues (git-fixes).\n- ice: Continue probe on link/PHY errors (jsc#SLE-12878).\n- ice: Fix for dereference of NULL pointer (git-fixes).\n- ice: Increase control queue timeout (git-fixes).\n- ice: Use port number instead of PF ID for WoL (jsc#SLE-12878).\n- ice: fix memory allocation call (jsc#SLE-12878).\n- ice: fix memory leak if register_netdev_fails (git-fixes).\n- ice: fix memory leak in ice_vsi_setup (git-fixes).\n- ice: fix memory leak of aRFS after resuming from suspend (jsc#SLE-12878).\n- ice: prevent ice_open and ice_stop during reset (git-fixes).\n- ice: remove DCBNL_DEVRESET bit from PF state (jsc#SLE-7926).\n- ics932s401: fix broken handling of errors when word reading fails (git-fixes).\n- igb: Fix duplicate include guard (git-fixes).\n- igb: XDP extack message on error (jsc#SLE-13536).\n- igb: XDP xmit back fix error code (jsc#SLE-13536).\n- igb: avoid premature Rx buffer reuse (jsc#SLE-13536).\n- igb: avoid transmit queue timeout in xdp path (jsc#SLE-13536).\n- igb: check timestamp validity (git-fixes).\n- igb: skb add metasize for xdp (jsc#SLE-13536).\n- igb: take VLAN double header into account (jsc#SLE-13536).\n- igb: use xdp_do_flush (jsc#SLE-13536).\n- igc: Fix Pause Frame Advertising (git-fixes).\n- igc: Fix Supported Pause Frame Link Setting (git-fixes).\n- igc: Fix igc_ptp_rx_pktstamp() (bsc#1160634).\n- igc: Fix igc_ptp_rx_pktstamp() (bsc#1160634).\n- igc: reinit_locked() should be called with rtnl_lock (git-fixes).\n- igc: reinit_locked() should be called with rtnl_lock (git-fixes).\n- iio: adc: ad7124: Fix missbalanced regulator enable / disable on error (git-fixes).\n- iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers (git-fixes).\n- iio: adc: ad7768-1: Fix too small buffer passed to iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: ad7793: Add missing error code in ad7793_setup() (git-fixes).\n- iio: adc: ad7949: fix wrong ADC result due to incorrect bit mask (git-fixes).\n- iio: adis16400: Fix an error code in adis16400_initial_setup() (git-fixes).\n- iio: gyro: fxas21002c: balance runtime power in error path (git-fixes).\n- iio: gyro: mpu3050: Fix error handling in mpu3050_trigger_handler (git-fixes).\n- iio: gyro: mpu3050: Fix reported temperature value (git-fixes).\n- iio: hid-sensor-humidity: Fix alignment issue of timestamp channel (git-fixes).\n- iio: hid-sensor-prox: Fix scale not correct issue (git-fixes).\n- iio: hid-sensor-temperature: Fix issues of timestamp channel (git-fixes).\n- iio: proximity: pulsedlight: Fix rumtime PM imbalance on error (git-fixes).\n- iio: tsl2583: Fix division by a zero lux_val (git-fixes).\n- iio:accel:adis16201: Fix wrong axis assignment that prevents loading (git-fixes).\n- iio:adc:qcom-spmi-vadc: add default scale to LR_MUX2_BAT_ID channel (git-fixes).\n- ima: Free IMA measurement buffer after kexec syscall (git-fixes).\n- include/linux/sched/mm.h: use rcu_dereference in in_vfork() (git-fixes).\n- intel_th: Consistency and off-by-one fix (git-fixes).\n- intel_th: pci: Add Alder Lake-M support (git-fixes).\n- intel_th: pci: Add Rocket Lake CPU support (git-fixes).\n- interconnect: core: fix error return code of icc_link_destroy() (git-fixes).\n- iommu/amd: Add support for map/unmap_resource (jsc#ECO-3482).\n- iommu/amd: Fix sleeping in atomic in increase_address_space() (bsc#1183277).\n- iommu/amd: Fix sleeping in atomic in increase_address_space() (bsc#1183310).\n- iommu/intel: Fix memleak in intel_irq_remapping_alloc (bsc#1183278).\n- iommu/intel: Fix memleak in intel_irq_remapping_alloc (bsc#1183312).\n- iommu/qcom: add missing put_device() call in qcom_iommu_of_xlate() (bsc#1183313).\n- iommu/qcom: add missing put_device() call in qcom_iommu_of_xlate() (bsc#1183637).\n- iommu/vt-d: Add get_domain_info() helper (bsc#1183279).\n- iommu/vt-d: Avoid panic if iommu init fails in tboot system (bsc#1183280).\n- iommu/vt-d: Avoid panic if iommu init fails in tboot system (bsc#1183315).\n- iommu/vt-d: Correctly check addr alignment in qi_flush_dev_iotlb_pasid() (bsc#1183281).\n- iommu/vt-d: Correctly check addr alignment in qi_flush_dev_iotlb_pasid() (bsc#1183316).\n- iommu/vt-d: Do not use flush-queue when caching-mode is on (bsc#1183282).\n- iommu/vt-d: Do not use flush-queue when caching-mode is on (bsc#1183317).\n- iommu/vt-d: Fix general protection fault in aux_detach_device() (bsc#1183283).\n- iommu/vt-d: Fix general protection fault in aux_detach_device() (bsc#1183318).\n- iommu/vt-d: Fix ineffective devTLB invalidation for subdevices (bsc#1183284).\n- iommu/vt-d: Fix ineffective devTLB invalidation for subdevices (bsc#1183319).\n- iommu/vt-d: Fix status code for Allocate/Free PASID command (bsc#1183320).\n- iommu/vt-d: Fix unaligned addresses for intel_flush_svm_range_dev() (bsc#1183285).\n- iommu/vt-d: Fix unaligned addresses for intel_flush_svm_range_dev() (bsc#1183321).\n- iommu/vt-d: Move intel_iommu info from struct intel_svm to struct intel_svm_dev (bsc#1183286).\n- iommu/vt-d: Move intel_iommu info from struct intel_svm to struct intel_svm_dev (bsc#1183322).\n- iommu/vt-d: Use device numa domain if RHSA is missing (bsc#1184585).\n- iommu: Check dev-\u003eiommu in dev_iommu_priv_get() before dereferencing it (bsc#1183311).\n- iommu: Switch gather-\u003eend to the inclusive end (bsc#1183314).\n- ionic: linearize tso skb with too many frags (bsc#1167773).\n- ionic: linearize tso skb with too many frags (bsc#1167773).\n- iopoll: introduce read_poll_timeout macro (git-fixes).\n- ipc/mqueue, msg, sem: Avoid relying on a stack reference past its expiry (bsc#1185988).\n- ipmi/watchdog: Stop watchdog timer when the current action is \u0027none\u0027 (bsc#1184855).\n- ipw2x00: potential buffer overflow in libipw_wx_set_encodeext() (git-fixes).\n- irqchip/ls-extirq: Add LS1043A, LS1088A external interrupt support (bsc#1184264).\n- irqchip/ls-extirq: Add LS1043A, LS1088A external interrupt support (bsc#1185233).\n- irqchip/ls-extirq: add IRQCHIP_SKIP_SET_WAKE to the irqchip flags (bsc#1184264).\n- irqchip/ls-extirq: add IRQCHIP_SKIP_SET_WAKE to the irqchip flags (bsc#1185233).\n- irqchip: Add support for Layerscape external interrupt lines (bsc#1185233).\n- isofs: release buffer head before return (bsc#1182613).\n- iwlwifi: add support for Qu with AX201 device (git-fixes).\n- iwlwifi: pcie: make cfg vs. trans_cfg more robust (git-fixes).\n- ixgbe: fail to create xfrm offload of IPsec tunnel mode SA (git-fixes).\n- ixgbe: fix unbalanced device enable/disable in suspend/resume (jsc#SLE-13706).\n- jffs2: fix use after free in jffs2_sum_write_data() (bsc#1184740).\n- kABI: Fix kABI caused by fixes for bsc#1174426 (bsc#1174426).\n- kABI: cover up change in struct kvm_arch (bsc#1184969).\n- kABI: powerpc/pmem: Include pmem prototypes (bsc#1113295 git-fixes).\n- kABI: powerpc/pseries: Add shutdown() to vio_driver and vio_bus (bsc#1184209 ltc#190917).\n- kABI: repair after \u0027nVMX: Properly handle userspace interrupt window request\u0027 \n- kbuild: Fail if gold linker is detected (bcs#1181862).\n- kbuild: add dummy toolchains to enable all cc-option etc. in Kconfig (bcs#1181862).\n- kbuild: change *FLAGS_\u0026lt;basetarget\u003e.o to take the path relative to $(obj) (bcs#1181862).\n- kbuild: dummy-tools, fix inverted tests for gcc (bcs#1181862).\n- kbuild: dummy-tools, support MPROFILE_KERNEL checks for ppc (bsc#1181862).\n- kbuild: improve cc-option to clean up all temporary files (bsc#1178330).\n- kbuild: include scripts/Makefile.* only when relevant CONFIG is enabled (bcs#1181862).\n- kbuild: simplify GCC_PLUGINS enablement in dummy-tools/gcc (bcs#1181862).\n- kbuild: stop filtering out $(GCC_PLUGINS_CFLAGS) from cc-option base (bcs#1181862).\n- kbuild: use -S instead of -E for precise cc-option test in Kconfig (bsc#1178330).\n- kconfig: introduce m32-flag and m64-flag (bcs#1181862).\n- kernel-docs.spec.in: Build using an utf-8 locale. Sphinx cannot handle UTF-8 input in non-UTF-8 locale.\n- kernel/smp: make csdlock timeout depend on boot parameter (bsc#1180846). \n- kvm: svm: Update svm_xsaves_supported (jsc#SLE-13573).\n- kvm: x86: Enumerate support for CLZERO instruction (jsc#SLE-13573).\n- leds: lp5523: check return value of lp5xx_read and jump to cleanup code (git-fixes).\n- lib/syscall: fix syscall registers retrieval on 32-bit platforms (git-fixes).\n- libbpf: Add explicit padding to bpf_xdp_set_link_opts (bsc#1177028).\n- libbpf: Add explicit padding to btf_dump_emit_type_decl_opts (bsc#1177028).\n- libbpf: Clear map_info before each bpf_obj_get_info_by_fd (bsc#1155518).\n- libbpf: Fix BTF dump of pointer-to-array-of-struct (bsc#1155518).\n- libbpf: Fix INSTALL flag order (bsc#1155518).\n- libbpf: Fix bail out from \u0027ringbuf_process_ring()\u0027 on error (bsc#1177028).\n- libbpf: Fix error path in bpf_object__elf_init() (bsc#1177028).\n- libbpf: Fix signed overflow in ringbuf_process_ring (bsc#1177028).\n- libbpf: Initialize the bpf_seq_printf parameters array field by field (bsc#1177028).\n- libbpf: Only create rx and tx XDP rings when necessary (bsc#1155518).\n- libbpf: Use SOCK_CLOEXEC when opening the netlink socket (bsc#1155518).\n- libnvdimm/label: Return -ENXIO for no slot in __blk_label_update (bsc#1185269).\n- libnvdimm/namespace: Fix reaping of invalidated block-window-namespace labels (bsc#1185269).\n- libnvdimm/region: Fix nvdimm_has_flush() to handle ND_REGION_ASYNC (bsc#1184969 git-fixes).\n- libnvdimm/security: ensure sysfs poll thread woke up and fetch updated attr (git-fixes).\n- liquidio: Fix unintented sign extension of a left shift of a u16 (git-fixes).\n- locking/mutex: Fix non debug version of mutex_lock_io_nested() (git-fixes).\n- locking/qrwlock: Fix ordering in queued_write_lock_slowpath() (bsc#1185041).\n- lpfc: Decouple port_template and vport_template (bsc#185032).\n- mISDN: fix crash in fritzpci (git-fixes).\n- mac80211: Allow HE operation to be longer than expected (git-fixes).\n- mac80211: bail out if cipher schemes are invalid (git-fixes).\n- mac80211: choose first enabled channel for monitor (git-fixes).\n- mac80211: clear sta-\u003efast_rx when STA removed from 4-addr VLAN (git-fixes).\n- mac80211: clear the beacon\u0027s CRC after channel switch (git-fixes).\n- mac80211: fix TXQ AC confusion (git-fixes).\n- mac80211: fix double free in ibss_leave (git-fixes).\n- mac80211: fix rate mask reset (git-fixes).\n- macvlan: macvlan_count_rx() needs to be aware of preemption (git-fixes).\n- md-cluster: fix use-after-free issue when removing rdev (bsc#1184082).\n- md/raid1: properly indicate failure when ending a failed write request (bsc#1185680).\n- md: do not flush workqueue unconditionally in md_open (bsc#1184081).\n- md: factor out a mddev_find_locked helper from mddev_find (bsc#1184081).\n- md: md_open returns -EBUSY when entering racing area (bsc#1184081).\n- md: split mddev_find (bsc#1184081).\n- mdio: fix mdio-thunder.c dependency \u0026 build error (git-fixes).\n- media: adv7604: fix possible use-after-free in adv76xx_remove() (git-fixes).\n- media: cros-ec-cec: do not bail on device_init_wakeup failure (git-fixes).\n- media: cx23885: add more quirks for reset DMA on some AMD IOMMU (git-fixes).\n- media: drivers: media: pci: sta2x11: fix Kconfig dependency on GPIOLIB (git-fixes).\n- media: dvb-usb: fix memory leak in dvb_usb_adapter_init (git-fixes).\n- media: dvbdev: Fix memory leak in dvb_media_device_free() (git-fixes).\n- media: em28xx: fix memory leak (git-fixes).\n- media: gspca/sq905.c: fix uninitialized variable (git-fixes).\n- media: i2c: adv7511-v4l2: fix possible use-after-free in adv7511_remove() (git-fixes).\n- media: i2c: adv7842: fix possible use-after-free in adv7842_remove() (git-fixes).\n- media: i2c: tda1997: Fix possible use-after-free in tda1997x_remove() (git-fixes).\n- media: imx: capture: Return -EPIPE from __capture_legacy_try_fmt() (git-fixes).\n- media: ite-cir: check for receive overflow (git-fixes).\n- media: m88rs6000t: avoid potential out-of-bounds reads on arrays (git-fixes).\n- media: mantis: remove orphan mantis_core.c (git-fixes).\n- media: mceusb: sanity check for prescaler value (git-fixes).\n- media: media/saa7164: fix saa7164_encoder_register() memory leak bugs (git-fixes).\n- media: omap4iss: return error code when omap4iss_get() failed (git-fixes).\n- media: platform: sti: Fix runtime PM imbalance in regs_show (git-fixes).\n- media: platform: sunxi: sun6i-csi: fix error return code of sun6i_video_start_streaming() (git-fixes).\n- media: rc: compile rc-cec.c into rc-core (git-fixes).\n- media: saa7134: use sg_dma_len when building pgtable (git-fixes).\n- media: saa7146: use sg_dma_len when building pgtable (git-fixes).\n- media: staging/intel-ipu3: Fix memory leak in imu_fmt (git-fixes).\n- media: staging/intel-ipu3: Fix race condition during set_fmt (git-fixes).\n- media: staging/intel-ipu3: Fix set_fmt error handling (git-fixes).\n- media: tc358743: fix possible use-after-free in tc358743_remove() (git-fixes).\n- media: usbtv: Fix deadlock on suspend (git-fixes).\n- media: uvcvideo: Allow entities with no pads (git-fixes).\n- media: v4l2-ctrls.c: fix race condition in hdl-\u003erequests list (git-fixes).\n- media: v4l2-ctrls.c: fix shift-out-of-bounds in std_validate (git-fixes).\n- media: v4l: vsp1: Fix bru null pointer access (git-fixes).\n- media: v4l: vsp1: Fix uif null pointer access (git-fixes).\n- media: vicodec: add missing v4l2_ctrl_request_hdl_put() (git-fixes).\n- memory: gpmc: fix out of bounds read and dereference on gpmc_cs[] (git-fixes).\n- memory: mtk-smi: Fix PM usage counter unbalance in mtk_smi ops (bsc#1183325).\n- memory: pl353: fix mask of ECC page_size config register (git-fixes).\n- mfd: arizona: Fix rumtime PM imbalance on error (git-fixes).\n- mfd: intel_pmt: Fix nuisance messages and handling of disabled capabilities (git-fixes).\n- mfd: lpc_sch: Partially revert \u0027Add support for Intel Quark X1000\u0027 (git-fixes).\n- mfd: stm32-timers: Avoid clearing auto reload register (git-fixes).\n- misc/pvpanic: Export module FDT device table (git-fixes).\n- misc/uss720: fix memory leak in uss720_probe (git-fixes).\n- misc: eeprom_93xx46: Add quirk to support Microchip 93LC46B eeprom (git-fixes).\n- misc: fastrpc: restrict user apps from sending kernel RPC messages (git-fixes).\n- misc: lis3lv02d: Fix false-positive WARN on various HP models (git-fixes).\n- misc: vmw_vmci: explicitly initialize vmci_datagram payload (git-fixes).\n- misc: vmw_vmci: explicitly initialize vmci_notify_bm_set_msg struct (git-fixes).\n- mlxsw: spectrum_mr: Update egress RIF list before route\u0027s action (git-fixes).\n- mm, numa: fix bad pmd by atomically check for pmd_trans_huge when marking page tables prot_numa (bsc#1168777).\n- mm/rmap: fix potential pte_unmap on an not mapped pte (git-fixes).\n- mm: hugetlbfs: fix cannot migrate the fallocated HugeTLB page (git-fixes).\n- mm: memcontrol: fix cpuhotplug statistics flushing (bsc#1185606).\n- mmc: block: Update ext_csd.cache_ctrl if it was written (git-fixes).\n- mmc: core: Correct descriptions in mmc_of_parse() (git-fixes).\n- mmc: core: Do a power cycle when the CMD11 fails (git-fixes).\n- mmc: core: Fix partition switch time for eMMC (git-fixes).\n- mmc: core: Set read only for SD cards with permanent write protect bit (git-fixes).\n- mmc: cqhci: Add cqhci_deactivate() (git-fixes).\n- mmc: cqhci: Fix random crash when remove mmc module/card (git-fixes).\n- mmc: mmc_spi: Drop unused NO_IRQ definition (git-fixes).\n- mmc: mxs-mmc: Fix a resource leak in an error handling path in \u0027mxs_mmc_probe()\u0027 (git-fixes).\n- mmc: sdhci-iproc: Cap min clock frequency on BCM2711 (bsc#1186009)\n- mmc: sdhci-iproc: Set SDHCI_QUIRK_CAP_CLOCK_BASE_BROKEN on BCM2711 (bsc#1186009)\n- mmc: sdhci-of-arasan: Add missed checks for devm_clk_register() (git-fixes).\n- mmc: sdhci-of-dwcmshc: fix rpmb access (git-fixes).\n- mmc: sdhci-of-dwcmshc: implement specific set_uhs_signaling (git-fixes).\n- mmc: sdhci-of-dwcmshc: set SDHCI_QUIRK2_PRESET_VALUE_BROKEN (git-fixes).\n- mmc: sdhci-of-esdhc: make sure delay chain locked for HS400 (git-fixes).\n- mmc: sdhci-of-esdhc: set timeout to max before tuning (git-fixes).\n- mmc: sdhci-pci-gli: increase 1.8V regulator wait (git-fixes).\n- mmc: sdhci-pci: Add PCI IDs for Intel LKF (git-fixes).\n- mmc: sdhci-pci: Fix SDHCI_RESET_ALL for CQHCI for Intel GLK-based controllers (git-fixes).\n- mmc: sdhci-pci: Fix initialization of some SD cards for Intel BYT-based controllers (git-fixes).\n- mmc: sdhci: Check for reset prior to DMA address unmap (git-fixes).\n- mmc: sdhci: Use Auto CMD Auto Select only when v4_mode is true (git-fixes).\n- mmc: uniphier-sd: Fix a resource leak in the remove function (git-fixes).\n- mmc: uniphier-sd: Fix an error handling path in uniphier_sd_probe() (git-fixes).\n- mount: fix mounting of detached mounts onto targets that reside on shared mounts (git-fixes).\n- mt7601u: fix always true expression (git-fixes).\n- mt76: dma: do not report truncated frames to mac80211 (git-fixes).\n- mt76: mt7615: fix entering driver-own state on mt7663 (git-fixes).\n- mt76: mt7615: support loading EEPROM for MT7613BE (git-fixes).\n- mt76: mt76x0: disable GTK offloading (git-fixes).\n- mt76: mt7915: fix aggr len debugfs node (git-fixes).\n- mt76: mt7915: fix txpower init for TSSI off chips (git-fixes).\n- mtd: Handle possible -EPROBE_DEFER from parse_mtd_partitions() (git-fixes).\n- mtd: rawnand: atmel: Update ecc_stats.corrected counter (git-fixes).\n- mtd: rawnand: brcmnand: fix OOB R/W with Hamming ECC (git-fixes).\n- mtd: rawnand: fsmc: Fix error code in fsmc_nand_probe() (git-fixes).\n- mtd: rawnand: gpmi: Fix a double free in gpmi_nand_init (git-fixes).\n- mtd: rawnand: qcom: Return actual error code instead of -ENODEV (git-fixes).\n- mtd: require write permissions for locking and badblock ioctls (git-fixes).\n- mtd: spi-nor: Rename \u0027n25q512a\u0027 to \u0027mt25qu512a (n25q512a)\u0027 (bsc#1167260).\n- mtd: spi-nor: Split mt25qu512a (n25q512a) entry into two (bsc#1167260).\n- mtd: spinand: core: add missing MODULE_DEVICE_TABLE() (git-fixes).\n- mwifiex: pcie: skip cancel_work_sync() on reset failure path (git-fixes).\n- nbd: fix a block_device refcount leak in nbd_release (git-fixes).\n- net, xdp: Update pkt_type if generic XDP changes unicast MAC (git-fixes).\n- net/mlx4_core: Add missed mlx4_free_cmd_mailbox() (git-fixes).\n- net/mlx4_en: update moderation when config reset (git-fixes).\n- net/mlx5: Add back multicast stats for uplink representor (jsc#SLE-15172).\n- net/mlx5: Delete extra dump stack that gives nothing (git-fixes).\n- net/mlx5: Do not request more than supported EQs (git-fixes).\n- net/mlx5: Fix PPLM register mapping (jsc#SLE-8464).\n- net/mlx5: Fix bit-wise and with zero (jsc#SLE-15172).\n- net/mlx5: Fix health error state handling (bsc#1186467).\n- net/mlx5e: Allow to match on MPLS parameters only for MPLS over UDP (jsc#SLE-15172).\n- net/mlx5e: Do not match on Geneve options in case option masks are all zero (git-fixes).\n- net/mlx5e: E-switch, Fix rate calculation division (jsc#SLE-8464).\n- net/mlx5e: Fix error path for ethtool set-priv-flag (git-fixes).\n- net/mlx5e: Fix ethtool indication of connector type (git-fixes).\n- net/mlx5e: Fix setting of RS FEC mode (jsc#SLE-15172).\n- net/mlx5e: Offload tuple rewrite for non-CT flows (jsc#SLE-15172).\n- net/mlx5e: RX, Mind the MPWQE gaps when calculating offsets (jsc#SLE-15172).\n- net/mlx5e: fix ingress_ifindex check in mlx5e_flower_parse_meta (jsc#SLE-8464).\n- net/qlcnic: Fix a use after free in qlcnic_83xx_get_minidump_template (git-fixes).\n- net/sched: act_ct: fix wild memory access when clearing fragments (bsc#1176447).\n- net: arc_emac: Fix memleak in arc_mdio_probe (git-fixes).\n- net: atheros: switch from \u0027pci_\u0027 to \u0027dma_\u0027 API (git-fixes).\n- net: atlantic: fix out of range usage of active_vlans array (git-fixes).\n- net: atlantic: fix potential error handling (git-fixes).\n- net: atlantic: fix use after free kasan warn (git-fixes).\n- net: b44: fix error return code in b44_init_one() (git-fixes).\n- net: bonding: fix error return code of bond_neigh_init() (bsc#1154353).\n- net: cdc-phonet: fix data-interface release on probe failure (git-fixes).\n- net: cls_api: Fix uninitialised struct field bo-\u003eunlocked_driver_cb (bsc#1176447).\n- net: dsa: felix: implement port flushing on .phylink_mac_link_down (git-fixes).\n- net: dsa: rtl8366: Fix VLAN semantics (git-fixes).\n- net: dsa: rtl8366: Fix VLAN set-up (git-fixes).\n- net: dsa: rtl8366rb: Support all 4096 VLANs (git-fixes).\n- net: enetc: allow hardware timestamping on TX queues with tc-etf enabled (git-fixes).\n- net: enetc: do not disable VLAN filtering in IFF_PROMISC mode (git-fixes).\n- net: enetc: fix link error again (git-fixes).\n- net: enetc: remove bogus write to SIRXIDR from enetc_setup_rxbdr (git-fixes).\n- net: enetc: take the MDIO lock only once per NAPI poll cycle (git-fixes).\n- net: enic: Cure the enic api locking trainwreck (git-fixes).\n- net: ethernet: aquantia: Fix wrong return value (git-fixes).\n- net: ethernet: cavium: octeon_mgmt: use phy_start and phy_stop (git-fixes).\n- net: ethernet: ibm: ibmvnic: Fix some kernel-doc misdemeanours (bsc#1183871 ltc#192139).\n- net: ethernet: ti: cpsw: fix clean up of vlan mc entries for host port (git-fixes).\n- net: ethernet: ti: cpsw: fix error return code in cpsw_probe() (git-fixes).\n- net: fec: Fix PHY init after phy_reset_after_clk_enable() (git-fixes).\n- net: fec: Fix phy_device lookup for phy_reset_after_clk_enable() (git-fixes).\n- net: fec: Fix reference count leak in fec series ops (git-fixes).\n- net: gemini: Fix another missing clk_disable_unprepare() in probe (git-fixes).\n- net: gemini: Fix missing free_netdev() in error path of gemini_ethernet_port_probe() (git-fixes).\n- net: geneve: check skb is large enough for IPv4/IPv6 header (git-fixes).\n- net: geneve: modify IP header check in geneve6_xmit_skb and geneve_xmit_skb (git-fixes).\n- net: gianfar: Add of_node_put() before goto statement (git-fixes).\n- net: hdlc: In hdlc_rcv, check to make sure dev is an HDLC device (git-fixes).\n- net: hdlc_raw_eth: Clear the IFF_TX_SKB_SHARING flag after calling ether_setup (git-fixes).\n- net: hns3: Fix for geneve tx checksum bug (git-fixes).\n- net: hns3: Remove the left over redundant check \u0026 assignment (bsc#1154353).\n- net: hns3: Remove un-necessary \u0027else-if\u0027 in the hclge_reset_event() (git-fixes).\n- net: hns3: add check for HNS3_NIC_STATE_INITED in hns3_reset_notify_up_enet() (git-fixes).\n- net: hns3: clear VF down state bit before request link status (git-fixes).\n- net: hns3: clear unnecessary reset request in hclge_reset_rebuild (git-fixes).\n- net: hns3: disable phy loopback setting in hclge_mac_start_phy (git-fixes).\n- net: hns3: fix bug when calculating the TCAM table info (git-fixes).\n- net: hns3: fix for vxlan gpe tx checksum bug (git-fixes).\n- net: hns3: fix incorrect configuration for igu_egu_hw_err (git-fixes).\n- net: hns3: fix query vlan mask value error for flow director (git-fixes).\n- net: hns3: initialize the message content in hclge_get_link_mode() (git-fixes).\n- net: hns3: use netif_tx_disable to stop the transmit queue (git-fixes).\n- net: korina: cast KSEG0 address to pointer in kfree (git-fixes).\n- net: korina: fix kfree of rx/tx descriptor array (git-fixes).\n- net: lantiq: Wait for the GPHY firmware to be ready (git-fixes).\n- net: ll_temac: Add more error handling of dma_map_single() calls (git-fixes).\n- net: ll_temac: Fix RX buffer descriptor handling on GFP_ATOMIC pressure (git-fixes).\n- net: ll_temac: Fix race condition causing TX hang (git-fixes).\n- net: ll_temac: Handle DMA halt condition caused by buffer underrun (git-fixes).\n- net: mvneta: fix double free of txq-\u003ebuf (git-fixes).\n- net: mvneta: make tx buffer array agnostic (git-fixes).\n- net: pasemi: fix error return code in pasemi_mac_open() (git-fixes).\n- net: phy: broadcom: Only advertise EEE for supported modes (git-fixes).\n- net: phy: intel-xway: enable integrated led functions (git-fixes).\n- net: phy: marvell: fix m88e1011_set_downshift (git-fixes).\n- net: phy: marvell: fix m88e1111_set_downshift (git-fixes).\n- net: qcom/emac: add missed clk_disable_unprepare in error path of emac_clks_phase1_init (git-fixes).\n- net: qualcomm: rmnet: Fix incorrect receive packet handling during cleanup (git-fixes).\n- net: sched: disable TCQ_F_NOLOCK for pfifo_fast (bsc#1183405)\n- net: smc911x: Adjust indentation in smc911x_phy_configure (git-fixes).\n- net: spider_net: Fix the size used in a \u0027dma_free_coherent()\u0027 call (git-fixes).\n- net: stmmac: Fix incorrect location to set real_num_rx|tx_queues (git-fixes).\n- net: stmmac: Use rtnl_lock/unlock on netif_set_real_num_rx_queues() call (git-fixes).\n- net: stmmac: fix missing IFF_MULTICAST check in dwmac4_set_filter (git-fixes).\n- net: stmmac: removed enabling eee in EEE set callback (git-fixes).\n- net: stmmac: use netif_tx_start|stop_all_queues() function (git-fixes).\n- net: stmmac: xgmac: fix missing IFF_MULTICAST checki in dwxgmac2_set_filter (git-fixes).\n- net: thunderx: Fix unintentional sign extension issue (git-fixes).\n- net: tulip: Adjust indentation in {dmfe, uli526x}_init_module (git-fixes).\n- net: usb: ax88179_178a: fix missing stop entry in driver_info (git-fixes).\n- net: usb: fix memory leak in smsc75xx_bind (git-fixes).\n- net: usb: qmi_wwan: allow qmimux add/del with master up (git-fixes).\n- net: usb: qmi_wwan: support ZTE P685M modem (git-fixes).\n- net: wan/lmc: unregister device when no matching device is found (git-fixes).\n- net:nfc:digital: Fix a double free in digital_tg_recv_dep_req (git-fixes).\n- netdevice: Add missing IFF_PHONY_HEADROOM self-definition (git-fixes).\n- netdevsim: init u64 stats for 32bit hardware (git-fixes).\n- netfilter: conntrack: Make global sysctls readonly in non-init netns (bsc#1176447).\n- netfilter: conntrack: add new sysctl to disable RST check (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: avoid misleading \u0027invalid\u0027 in log message (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: improve RST handling when tuple is re-used (bsc#1183947 bsc#1185950).\n- netfilter: flowtable: Make sure GC works periodically in idle system (bsc#1176447).\n- netfilter: flowtable: fix NAT IPv6 offload mangling (bsc#1176447).\n- netfilter: nftables: allow to update flowtable flags (bsc#1176447).\n- netfilter: nftables: report EOPNOTSUPP on unsupported flowtable flags (bsc#1176447).\n- netsec: restore phy power state after controller reset (bsc#1183757).\n- nfc: pn533: prevent potential memory corruption (git-fixes).\n- nfp: devlink: initialize the devlink port attribute \u0027lanes\u0027 (bsc#1176447).\n- nfp: flower: add ipv6 bit to pre_tunnel control message (bsc#1176447).\n- nfp: flower: fix pre_tun mask id allocation (bsc#1154353).\n- nfp: flower: ignore duplicate merge hints from FW (git-fixes).\n- node: fix device cleanups in error handling code (git-fixes).\n- null_blk: fix passing of REQ_FUA flag in null_handle_rq (git-fixes).\n- nvme-core: add cancel tagset helpers (bsc#1183976).\n- nvme-fabrics: decode host pathing error for connect (bsc#1179827).\n- nvme-fabrics: fix kato initialization (bsc#1182591).\n- nvme-fabrics: only reserve a single tag (bsc#1182077).\n- nvme-fabrics: reject I/O to offline device (bsc#1181161).\n- nvme-fc: check sgl supported by target (bsc#1179827).\n- nvme-fc: clear q_live at beginning of association teardown (bsc#1186479).\n- nvme-fc: fix racing controller reset and create association (bsc#1183048).\n- nvme-fc: return NVME_SC_HOST_ABORTED_CMD when a command has been aborted (bsc#1180197).\n- nvme-fc: return NVME_SC_HOST_ABORTED_CMD when a command has been aborted (bsc#1184259).\n- nvme-fc: set NVME_REQ_CANCELLED in nvme_fc_terminate_exchange() (bsc#1180197).\n- nvme-fc: set NVME_REQ_CANCELLED in nvme_fc_terminate_exchange() (bsc#1184259).\n- nvme-fc: short-circuit reconnect retries (bsc#1179827).\n- nvme-hwmon: Return error code when registration fails (bsc#1177326).\n- nvme-hwmon: Return error code when registration fails (bsc#1177326).\n- nvme-multipath: fix double initialization of ANA state (bsc#1178612, bsc#1184259).\n- nvme-multipath: reset bdev to ns head when failover (bsc#178378 bsc#1182999).\n- nvme-pci: Remove tag from process cq (git-fixes).\n- nvme-pci: Remove two-pass completions (git-fixes).\n- nvme-pci: Simplify nvme_poll_irqdisable (git-fixes).\n- nvme-pci: align io queue count with allocted nvme_queue in (git-fixes).\n- nvme-pci: avoid race between nvme_reap_pending_cqes() and nvme_poll() (git-fixes).\n- nvme-pci: dma read memory barrier for completions (git-fixes).\n- nvme-pci: fix \u0027slimmer CQ head update\u0027 (git-fixes).\n- nvme-pci: make sure write/poll_queues less or equal then cpu (git-fixes).\n- nvme-pci: remove last_sq_tail (git-fixes).\n- nvme-pci: remove volatile cqes (git-fixes).\n- nvme-pci: slimmer CQ head update (git-fixes).\n- nvme-pci: use simple suspend when a HMB is enabled (git-fixes).\n- nvme-tcp: Fix possible race of io_work and direct send (git-fixes).\n- nvme-tcp: Fix warning with CONFIG_DEBUG_PREEMPT (git-fixes).\n- nvme-tcp: add clean action for failed reconnection (bsc#1183976).\n- nvme-tcp: fix kconfig dependency warning when !CRYPTO (git-fixes).\n- nvme-tcp: fix misuse of __smp_processor_id with preemption (git-fixes).\n- nvme-tcp: fix possible hang waiting for icresp response (bsc#1179519).\n- nvme-tcp: fix possible hang when failing to set io queues (bsc#1181161).\n- nvme-tcp: use cancel tagset helper for tear down (bsc#1183976).\n- nvme: Fix NULL dereference for pci nvme controllers (bsc#1182378).\n- nvme: add \u0027kato\u0027 sysfs attribute (bsc#1179825).\n- nvme: add NVME_REQ_CANCELLED flag in nvme_cancel_request() (bsc#1180197).\n- nvme: add NVME_REQ_CANCELLED flag in nvme_cancel_request() (bsc#1184259).\n- nvme: allocate the keep alive request using BLK_MQ_REQ_NOWAIT (bsc#1182077).\n- nvme: call nvme_identify_ns as the first thing in nvme_alloc_ns_block (bsc#1180197).\n- nvme: clean up the check for too large logic block sizes (bsc#1180197).\n- nvme: define constants for identification values (git-fixes).\n- nvme: do not intialize hwmon for discovery controllers (bsc#1184259).\n- nvme: do not intialize hwmon for discovery controllers (git-fixes).\n- nvme: document nvme controller states (git-fixes).\n- nvme: explicitly update mpath disk capacity on revalidation (git-fixes).\n- nvme: expose reconnect_delay and ctrl_loss_tmo via sysfs (bsc#1182378).\n- nvme: factor out a nvme_configure_metadata helper (bsc#1180197).\n- nvme: fix controller instance leak (git-fixes).\n- nvme: fix deadlock in disconnect during scan_work and/or ana_work (git-fixes).\n- nvme: fix initialization of the zone bitmaps (bsc#1180197).\n- nvme: fix possible deadlock when I/O is blocked (git-fixes).\n- nvme: freeze the queue over -\u003elba_shift updates (bsc#1180197).\n- nvme: lift the check for an unallocated namespace into nvme_identify_ns (bsc#1180197).\n- nvme: merge nvme_keep_alive into nvme_keep_alive_work (bsc#1182077).\n- nvme: move nvme_validate_ns (bsc#1180197).\n- nvme: opencode revalidate_disk in nvme_validate_ns (bsc#1180197).\n- nvme: query namespace identifiers before adding the namespace (bsc#1180197).\n- nvme: refactor nvme_validate_ns (bsc#1180197).\n- nvme: remove nvme_identify_ns_list (bsc#1180197).\n- nvme: remove nvme_update_formats (bsc#1180197).\n- nvme: remove superfluous else in nvme_ctrl_loss_tmo_store (bsc#1182378).\n- nvme: remove the 0 lba_shift check in nvme_update_ns_info (bsc#1180197).\n- nvme: remove the disk argument to nvme_update_zone_info (bsc#1180197).\n- nvme: rename __nvme_revalidate_disk (bsc#1180197).\n- nvme: rename _nvme_revalidate_disk (bsc#1180197).\n- nvme: rename nvme_validate_ns to nvme_validate_or_alloc_ns (bsc#1180197).\n- nvme: retrigger ANA log update if group descriptor isn\u0027t found (git-fixes)\n- nvme: return an error if nvme_set_queue_count() fails (bsc#1180197).\n- nvme: revalidate zone bitmaps in nvme_update_ns_info (bsc#1180197).\n- nvme: sanitize KATO setting (bsc#1179825).\n- nvme: set the queue limits in nvme_update_ns_info (bsc#1180197).\n- nvme: simplify error logic in nvme_validate_ns() (bsc#1180197).\n- nvme: simplify error logic in nvme_validate_ns() (bsc#1184259).\n- nvme: update the known admin effects (bsc#1180197).\n- nvmet-rdma: Fix list_del corruption on queue establishment failure (bsc#1183501).\n- nvmet: fix a memory leak (git-fixes).\n- nvmet: seset ns-\u003efile when open fails (bsc#1183873).\n- nvmet: use new ana_log_size instead the old one (bsc#1184259).\n- nxp-i2c: restore includes for kABI (bsc#1185589).\n- nxp-nci: add NXP1002 id (bsc#1185589).\n- ocfs2: fix a use after free on error (bsc#1184738).\n- ovl: fix dentry leak in ovl_get_redirect (bsc#1184176).\n- ovl: fix out of date comment and unreachable code (bsc#1184176).\n- ovl: fix regression with re-formatted lower squashfs (bsc#1184176).\n- ovl: fix unneeded call to ovl_change_flags() (bsc#1184176).\n- ovl: fix value of i_ino for lower hardlink corner case (bsc#1184176).\n- ovl: initialize error in ovl_copy_xattr (bsc#1184176).\n- ovl: relax WARN_ON() when decoding lower directory file handle (bsc#1184176).\n- partitions/ibm: fix non-DASD devices (bsc#1185857 LTC#192526).\n- pata_arasan_cf: fix IRQ check (git-fixes).\n- pata_ipx4xx_cf: fix IRQ check (git-fixes).\n- perf/amd/uncore: Fix sysfs type mismatch (bsc#1178134).\n- phy: marvell: ARMADA375_USBCLUSTER_PHY should not default to y, unconditionally (git-fixes).\n- phy: phy-twl4030-usb: Fix possible use-after-free in twl4030_usb_remove() (git-fixes).\n- pinctrl: Ingenic: Add missing pins to the JZ4770 MAC MII group (git-fixes).\n- pinctrl: core: Fix kernel doc string for pin_get_name() (git-fixes).\n- pinctrl: ingenic: Improve unreachable code generation (git-fixes).\n- pinctrl: lewisburg: Update number of pins in community (git-fixes).\n- pinctrl: qcom: spmi-gpio: fix warning about irq chip reusage (git-fixes).\n- pinctrl: rockchip: fix restore error in resume (git-fixes).\n- pinctrl: samsung: use \u0027int\u0027 for register masks in Exynos (git-fixes).\n- platform/mellanox: mlxbf-tmfifo: Fix a memory barrier issue (git-fixes).\n- platform/x86: acer-wmi: Add ACER_CAP_KBD_DOCK quirk for the Aspire Switch 10E SW3-016 (git-fixes).\n- platform/x86: acer-wmi: Add ACER_CAP_SET_FUNCTION_MODE capability flag (git-fixes).\n- platform/x86: acer-wmi: Add new force_caps module parameter (git-fixes).\n- platform/x86: acer-wmi: Add support for SW_TABLET_MODE on Switch devices (git-fixes).\n- platform/x86: acer-wmi: Cleanup ACER_CAP_FOO defines (git-fixes).\n- platform/x86: acer-wmi: Cleanup accelerometer device handling (git-fixes).\n- platform/x86: intel-hid: Support Lenovo ThinkPad X1 Tablet Gen 2 (git-fixes).\n- platform/x86: intel-vbtn: Stop reporting SW_DOCK events (git-fixes).\n- platform/x86: intel_int0002_vgpio: Only call enable_irq_wake() when using s2idle (git-fixes).\n- platform/x86: intel_pmc_core: Do not use global pmcdev in quirks (git-fixes).\n- platform/x86: intel_pmt_crashlog: Fix incorrect macros (git-fixes).\n- platform/x86: pmc_atom: Match all Beckhoff Automation baytrail boards with critclk_systems DMI table (git-fixes).\n- platform/x86: thinkpad_acpi: Allow the FnLock LED to change state (git-fixes).\n- platform/x86: thinkpad_acpi: Correct thermal sensor allocation (git-fixes).\n- posix-timers: Preserve return value in clock_adjtime32() (git-fixes)\n- post.sh: Return an error when module update fails (bsc#1047233 bsc#1184388).\n- power: supply: Use IRQF_ONESHOT (git-fixes).\n- power: supply: generic-adc-battery: fix possible use-after-free in gab_remove() (git-fixes).\n- power: supply: s3c_adc_battery: fix possible use-after-free in s3c_adc_bat_remove() (git-fixes).\n- powerepc/book3s64/hash: Align start/end address correctly with bolt mapping (bsc#1184957).\n- powerpc/64s/exception: Clean up a missed SRR specifier (jsc#SLE-9246 git-fixes).\n- powerpc/64s: Fix crashes when toggling entry flush barrier (bsc#1177666 git-fixes).\n- powerpc/64s: Fix crashes when toggling stf barrier (bsc#1087082 git-fixes).\n- powerpc/64s: Fix instruction encoding for lis in ppc_function_entry() (bsc#1065729).\n- powerpc/64s: Fix pte update for kernel memory on radix (bsc#1055117 git-fixes).\n- powerpc/asm-offsets: GPR14 is not needed either (bsc#1065729).\n- powerpc/book3s64/radix: Remove WARN_ON in destroy_context() (bsc#1183692 ltc#191963).\n- powerpc/eeh: Fix EEH handling for hugepages in ioremap space (bsc#1156395).\n- powerpc/fadump: Mark fadump_calculate_reserve_size as __init (bsc#1065729).\n- powerpc/kexec_file: Use current CPU info while setting up FDT (bsc#1184615 ltc#189835).\n- powerpc/kuap: Restore AMR after replaying soft interrupts (bsc#1156395).\n- powerpc/mm: Add cond_resched() while removing hpte mappings (bsc#1183289 ltc#191637).\n- powerpc/papr_scm: Fix build error due to wrong printf specifier (bsc#1184969).\n- powerpc/papr_scm: Implement support for H_SCM_FLUSH hcall (bsc#1184969).\n- powerpc/perf: Fix PMU constraint check for EBB events (bsc#1065729).\n- powerpc/perf: Fix sampled instruction type for larx/stcx (jsc#SLE-13513).\n- powerpc/perf: Fix the threshold event selection for memory events in power10 (jsc#SLE-13513).\n- powerpc/pmem: Include pmem prototypes (bsc#1113295 git-fixes).\n- powerpc/prom: Mark identical_pvr_fixup as __init (bsc#1065729).\n- powerpc/pseries/mobility: handle premature return from H_JOIN (bsc#1181674 ltc#189159 git-fixes bsc#1183662 ltc#191922).\n- powerpc/pseries/mobility: use struct for shared state (bsc#1181674 ltc#189159 git-fixes bsc#1183662 ltc#191922).\n- powerpc/pseries/ras: Remove unused variable \u0027status\u0027 (bsc#1065729).\n- powerpc/pseries: Add shutdown() to vio_driver and vio_bus (bsc#1184209 ltc#190917).\n- powerpc/pseries: Do not trace hcall tracing wrapper (bsc#1185110 ltc#192091).\n- powerpc/pseries: Fix hcall tracing recursion in pv queued spinlocks (bsc#1185110 ltc#192091).\n- powerpc/pseries: use notrace hcall variant for H_CEDE idle (bsc#1185110 ltc#192091).\n- powerpc/pseries: warn if recursing into the hcall tracing code (bsc#1185110 ltc#192091).\n- powerpc/smp: Reintroduce cpu_core_mask (jsc#SLE-13615 bsc#1180100 ltc#190257 git-fixes).\n- powerpc/sstep: Check instruction validity against ISA version before emulation (bsc#1156395).\n- powerpc/sstep: Check instruction validity against ISA version before emulation (bsc#1156395).\n- powerpc/sstep: Fix darn emulation (bsc#1156395).\n- powerpc/sstep: Fix incorrect return from analyze_instr() (bsc#1156395).\n- powerpc/sstep: Fix load-store and update emulation (bsc#1156395).\n- powerpc/time: Enable sched clock for irqtime (bsc#1156395).\n- powerpc/uaccess: Avoid might_fault() when user access is enabled (bsc#1156395).\n- powerpc/uaccess: Perform barrier_nospec() in KUAP allowance helpers (bsc#1156395).\n- powerpc/uaccess: Simplify unsafe_put_user() implementation (bsc#1156395).\n- powerpc/xive: Drop check on irq_data in xive_core_debug_show() (bsc#1177437 ltc#188522 jsc#SLE-13294 git-fixes).\n- powerpc/xmon: Fix build failure for 8xx (jsc#SLE-12936 git-fixes).\n- powerpc: Fix inverted SET_FULL_REGS bitop (jsc#SLE-9246 git-fixes).\n- powerpc: Fix missing declaration ofable_kernel_vsx() (git-fixes).\n- proc: fix lookup in /proc/net subdirectories after setns(2) (git-fixes).\n- qlcnic: fix error return code in qlcnic_83xx_restart_hw() (git-fixes).\n- qtnfmac: Fix possible buffer overflow in qtnf_event_handle_external_auth (git-fixes).\n- qxl: Fix uninitialised struct field head.surface_id (git-fixes).\n- r8169: do not advertise pause in jumbo mode (git-fixes).\n- r8169: fix DMA being used after buffer free if WoL is enabled (git-fixes).\n- r8169: tweak max read request size for newer chips also in jumbo mtu mode (git-fixes).\n- regmap: set debugfs_name to NULL after it is freed (git-fixes).\n- regulator: Avoid a double \u0027of_node_get\u0027 in \u0027regulator_of_get_init_node()\u0027 (git-fixes).\n- regulator: bd9571mwv: Fix AVS and DVFS voltage range (git-fixes).\n- reintroduce cqhci_suspend for kABI (git-fixes).\n- reiserfs: update reiserfs_xattrs_initialized() condition (bsc#1184737).\n- rsi: Fix TX EAPOL packet handling against iwlwifi AP (git-fixes).\n- rsi: Move card interrupt handling to RX thread (git-fixes).\n- rsi: Use resume_noirq for SDIO (git-fixes).\n- rsxx: remove extraneous \u0027const\u0027 qualifier (git-fixes).\n- rtc: ds1307: Fix wday settings for rx8130 (git-fixes).\n- rtc: fsl-ftm-alarm: add MODULE_TABLE() (bsc#1185454).\n- rtc: fsl-ftm-alarm: avoid struct rtc_time conversions (bsc#1185454).\n- rtc: fsl-ftm-alarm: enable acpi support (bsc#1185454).\n- rtc: fsl-ftm-alarm: fix freeze(s2idle) failed to wake (bsc#1185454).\n- rtc: fsl-ftm-alarm: report alarm to core (bsc#1185454).\n- rtc: fsl-ftm-alarm: switch to ktime_get_real_seconds (bsc#1185454).\n- rtc: fsl-ftm-alarm: switch to rtc_time64_to_tm/rtc_tm_to_time64 (bsc#1185454).\n- rtc: fsl-ftm-alarm: update acpi device id (bsc#1185454).\n- rtc: pcf2127: add alarm support (bsc#1185233).\n- rtc: pcf2127: add pca2129 device id (bsc#1185233).\n- rtc: pcf2127: add tamper detection support (bsc#1185233).\n- rtc: pcf2127: add watchdog feature support (bsc#1185233).\n- rtc: pcf2127: bugfix: watchdog build dependency (bsc#1185233).\n- rtc: pcf2127: cleanup register and bit defines (bsc#1185233).\n- rtc: pcf2127: convert to devm_rtc_allocate_device (bsc#1185233).\n- rtc: pcf2127: fix a bug when not specify interrupts property (bsc#1185233).\n- rtc: pcf2127: fix alarm handling (bsc#1185233).\n- rtc: pcf2127: fix pcf2127_nvmem_read/write() returns (bsc#1185233).\n- rtc: pcf2127: handle boot-enabled watchdog feature (bsc#1185233).\n- rtc: pcf2127: handle timestamp interrupts (bsc#1185495).\n- rtc: pcf2127: let the core handle rtc range (bsc#1185233).\n- rtc: pcf2127: move watchdog initialisation to a separate function (bsc#1185233).\n- rtc: pcf2127: only use watchdog when explicitly available (bsc#1185233).\n- rtc: pcf2127: properly set flag WD_CD for rtc chips(pcf2129, pca2129) (bsc#1185233).\n- rtc: pcf2127: remove unnecessary #ifdef (bsc#1185233).\n- rtc: pcf2127: set regmap max_register (bsc#1185233).\n- rtc: pcf2127: watchdog: handle nowayout feature (bsc#1185233).\n- rtlwifi: 8821ae: upgrade PHY and RF parameters (git-fixes).\n- rtw88: Fix an error code in rtw_debugfs_set_rsvd_page() (git-fixes).\n- rtw88: Fix array overrun in rtw_get_tx_power_params() (git-fixes).\n- rtw88: coex: 8821c: correct antenna switch function (git-fixes).\n- s390/cio: return -EFAULT if copy_to_user() fails (git-fixes).\n- s390/cio: return -EFAULT if copy_to_user() fails (git-fixes).\n- s390/crypto: return -EFAULT if copy_to_user() fails (git-fixes).\n- s390/dasd: fix hanging DASD driver unbind (bsc#1183932 LTC#192153).\n- s390/dasd: fix hanging IO request during DASD driver unbind (git-fixes).\n- s390/entry: save the caller of psw_idle (bsc#1185677).\n- s390/ipl: support NVMe IPL kernel parameters (bsc#1185980 LTC#192679).\n- s390/kdump: fix out-of-memory with PCI (bsc#1182257 LTC#191375).\n- s390/pci: fix leak of PCI device structure (git-fixes).\n- s390/qeth: fix memory leak after failed TX Buffer allocation (git-fixes).\n- s390/qeth: fix notification for pending buffers during teardown (git-fixes).\n- s390/qeth: improve completion of pending TX buffers (git-fixes).\n- s390/qeth: schedule TX NAPI on QAOB completion (git-fixes).\n- s390/vtime: fix increased steal time accounting (bsc#1183859).\n- s390/zcrypt: return EIO when msg retry limit reached (git-fixes).\n- samples, bpf: Add missing munmap in xdpsock (bsc#1155518).\n- samples/bpf: Fix possible hang in xdpsock with multiple threads (bsc#1155518).\n- sata_mv: add IRQ checks (git-fixes).\n- sched/eas: Do not update misfit status if the task is pinned (git-fixes)\n- sched/fair: Avoid stale CPU util_est value for schedutil in (git-fixes)\n- sched/fair: Fix shift-out-of-bounds in load_balance() (git fixes (sched)).\n- sched/fair: Fix unfairness caused by missing load decay (git-fixes)\n- scripts/git_sort/git_sort.py: add bpf git repo\n- scsi: aacraid: Improve compat_ioctl handlers (bsc#1186352).\n- scsi: block: Fix a race in the runtime power management code (git-fixes).\n- scsi: core: Only return started requests from scsi_host_find_tag() (bsc#1179851).\n- scsi: core: Run queue in case of I/O resource contention failure (bsc#1186416).\n- scsi: core: add scsi_host_busy_iter() (bsc#1179851).\n- scsi: fnic: Kill \u0027exclude_id\u0027 argument to fnic_cleanup_io() (bsc#1179851).\n- scsi: fnic: Remove bogus ratelimit messages (bsc#1183249).\n- scsi: libfc: Avoid invoking response handler twice if ep is already completed (bsc#1186573).\n- scsi: lpfc: Add a option to enable interlocked ABTS before job completion (bsc#1186451).\n- scsi: lpfc: Add ndlp kref accounting for resume RPI path (bsc#1186451).\n- scsi: lpfc: Change wording of invalid pci reset log message (bsc#1182574).\n- scsi: lpfc: Copyright updates for 12.8.0.9 patches (bsc#1185472).\n- scsi: lpfc: Correct function header comments related to ndlp reference counting (bsc#1182574).\n- scsi: lpfc: Eliminate use of LPFC_DRIVER_NAME in lpfc_attr.c (bsc#1185472).\n- scsi: lpfc: Fix \u0027Unexpected timeout\u0027 error in direct attach topology (bsc#1186451).\n- scsi: lpfc: Fix ADISC handling that never frees nodes (bsc#1182574).\n- scsi: lpfc: Fix DMA virtual address ptr assignment in bsg (bsc#1185365).\n- scsi: lpfc: Fix FLOGI failure due to accessing a freed node (bsc#1182574).\n- scsi: lpfc: Fix NMI crash during rmmod due to circular hbalock dependency (bsc#1185472).\n- scsi: lpfc: Fix Node recovery when driver is handling simultaneous PLOGIs (bsc#1186451).\n- scsi: lpfc: Fix PLOGI ACC to be transmit after REG_LOGIN (bsc#1182574).\n- scsi: lpfc: Fix a bunch of kernel-doc issues (bsc#1185472).\n- scsi: lpfc: Fix a bunch of kernel-doc misdemeanours (bsc#1185472).\n- scsi: lpfc: Fix a bunch of misnamed functions (bsc#1185472).\n- scsi: lpfc: Fix a few incorrectly named functions (bsc#1185472).\n- scsi: lpfc: Fix a typo (bsc#1185472).\n- scsi: lpfc: Fix bad memory access during VPD DUMP mailbox command (bsc#1186451).\n- scsi: lpfc: Fix crash caused by switch reboot (bsc#1182574).\n- scsi: lpfc: Fix crash when a REG_RPI mailbox fails triggering a LOGO response (bsc#1185472).\n- scsi: lpfc: Fix crash when lpfc_sli4_hba_setup() fails to initialize the SGLs (bsc#1186451).\n- scsi: lpfc: Fix dropped FLOGI during pt2pt discovery recovery (bsc#1182574).\n- scsi: lpfc: Fix error handling for mailboxes completed in MBX_POLL mode (bsc#1185472).\n- scsi: lpfc: Fix formatting and misspelling issues (bsc#1185472).\n- scsi: lpfc: Fix gcc -Wstringop-overread warning (bsc#1185472).\n- scsi: lpfc: Fix illegal memory access on Abort IOCBs (bsc#1183203).\n- scsi: lpfc: Fix incorrect dbde assignment when building target abts wqe (bsc#1182574).\n- scsi: lpfc: Fix incorrect naming of __lpfc_update_fcf_record() (bsc#1185472).\n- scsi: lpfc: Fix incorrectly documented function lpfc_debugfs_commonxripools_data() (bsc#1185472).\n- scsi: lpfc: Fix kernel-doc formatting issue (bsc#1185472).\n- scsi: lpfc: Fix lack of device removal on port swaps with PRLIs (bsc#1185472).\n- scsi: lpfc: Fix lpfc_els_retry() possible null pointer dereference (bsc#1182574).\n- scsi: lpfc: Fix lpfc_hdw_queue attribute being ignored (bsc#1185472).\n- scsi: lpfc: Fix missing FDMI registrations after Mgmt Svc login (bsc#1185472).\n- scsi: lpfc: Fix node handling for Fabric Controller and Domain Controller (bsc#1186451).\n- scsi: lpfc: Fix nodeinfo debugfs output (bsc#1182574).\n- scsi: lpfc: Fix non-optimized ERSP handling (bsc#1186451).\n- scsi: lpfc: Fix null pointer dereference in lpfc_prep_els_iocb() (bsc#1182574).\n- scsi: lpfc: Fix pt2pt connection does not recover after LOGO (bsc#1182574).\n- scsi: lpfc: Fix pt2pt state transition causing rmmod hang (bsc#1182574).\n- scsi: lpfc: Fix reference counting errors in lpfc_cmpl_els_rsp() (bsc#1185472).\n- scsi: lpfc: Fix reftag generation sizing errors (bsc#1182574).\n- scsi: lpfc: Fix rmmod crash due to bad ring pointers to abort_iotag (bsc#1185472).\n- scsi: lpfc: Fix silent memory allocation failure in lpfc_sli4_bsg_link_diag_test() (bsc#1185472).\n- scsi: lpfc: Fix some error codes in debugfs (bsc#1185472).\n- scsi: lpfc: Fix stale node accesses on stale RRQ request (bsc#1182574).\n- scsi: lpfc: Fix status returned in lpfc_els_retry() error exit path (bsc#1182574).\n- scsi: lpfc: Fix unnecessary null check in lpfc_release_scsi_buf (bsc#1182574).\n- scsi: lpfc: Fix unreleased RPIs when NPIV ports are created (bsc#1186451).\n- scsi: lpfc: Fix use after free in lpfc_els_free_iocb (bsc#1182574).\n- scsi: lpfc: Fix use-after-free on unused nodes after port swap (bsc#1185472).\n- scsi: lpfc: Fix various trivial errors in comments and log messages (bsc#1185472).\n- scsi: lpfc: Fix vport indices in lpfc_find_vport_by_vpid() (bsc#1182574).\n- scsi: lpfc: Ignore GID-FT response that may be received after a link flip (bsc#1186451).\n- scsi: lpfc: Reduce LOG_TRACE_EVENT logging for vports (bsc#1182574).\n- scsi: lpfc: Remove unsupported mbox PORT_CAPABILITIES logic (bsc#1185472).\n- scsi: lpfc: Reregister FPIN types if ELS_RDF is received from fabric controller (bsc#1186451).\n- scsi: lpfc: Standardize discovery object logging format (bsc#1185472).\n- scsi: lpfc: Update copyrights for 12.8.0.7 and 12.8.0.8 changes (bsc#1182574).\n- scsi: lpfc: Update lpfc version to 12.8.0.10 (bsc#1186451).\n- scsi: lpfc: Update lpfc version to 12.8.0.8 (bsc#1182574).\n- scsi: lpfc: Update lpfc version to 12.8.0.9 (bsc#1185472).\n- scsi: mpt3sas: Only one vSES is present even when IOC has multi vSES (bsc#1185954).\n- scsi: pm80xx: Do not sleep in atomic context (bsc#1186353).\n- scsi: pm80xx: Fix chip initialization failure (bsc#1186354).\n- scsi: pm80xx: Fix potential infinite loop (bsc#1186354).\n- scsi: pm80xx: Increase timeout for pm80xx mpi_uninit_check() (bsc#1186355).\n- scsi: qla2xxx: Add H:C:T info in the log message for fc ports (bsc#1185491).\n- scsi: qla2xxx: Add error counters to debugfs node (bsc#1185491).\n- scsi: qla2xxx: Always check the return value of qla24xx_get_isp_stats() (bsc#1185491).\n- scsi: qla2xxx: Assign boolean values to a bool variable (bsc#1185491).\n- scsi: qla2xxx: Check kzalloc() return value (bsc#1185491).\n- scsi: qla2xxx: Consolidate zio threshold setting for both FCP \u0026 NVMe (bsc#1185491).\n- scsi: qla2xxx: Constify struct qla_tgt_func_tmpl (bsc#1185491).\n- scsi: qla2xxx: Do logout even if fabric scan retries got exhausted (bsc#1185491).\n- scsi: qla2xxx: Enable NVMe CONF (BIT_7) when enabling SLER (bsc#1185491).\n- scsi: qla2xxx: Fix IOPS drop seen in some adapters (bsc#1185491).\n- scsi: qla2xxx: Fix RISC RESET completion polling (bsc#1185491).\n- scsi: qla2xxx: Fix a couple of misdocumented functions (bsc#1185491).\n- scsi: qla2xxx: Fix a couple of misnamed functions (bsc#1185491).\n- scsi: qla2xxx: Fix broken #endif placement (bsc#1185491).\n- scsi: qla2xxx: Fix crash in PCIe error handling (bsc#1185491).\n- scsi: qla2xxx: Fix crash in qla2xxx_mqueuecommand() (bsc#1185491).\n- scsi: qla2xxx: Fix endianness annotations (bsc#1185491).\n- scsi: qla2xxx: Fix incorrectly named function qla8044_check_temp() (bsc#1185491).\n- scsi: qla2xxx: Fix mailbox Ch erroneous error (bsc#1185491).\n- scsi: qla2xxx: Fix mailbox recovery during PCIe error (bsc#1185491).\n- scsi: qla2xxx: Fix some incorrect formatting/spelling issues (bsc#1185491).\n- scsi: qla2xxx: Fix some memory corruption (bsc#1185491).\n- scsi: qla2xxx: Fix stuck session (bsc#1185491).\n- scsi: qla2xxx: Fix use after free in bsg (bsc#1185491).\n- scsi: qla2xxx: Implementation to get and manage host, target stats and initiator port (bsc#1185491).\n- scsi: qla2xxx: Move some messages from debug to normal log level (bsc#1185491).\n- scsi: qla2xxx: Remove redundant NULL check (bsc#1185491).\n- scsi: qla2xxx: Remove unnecessary NULL check (bsc#1185491).\n- scsi: qla2xxx: Remove unneeded if-null-free check (bsc#1185491).\n- scsi: qla2xxx: Replace __qla2x00_marker()\u0027s missing underscores (bsc#1185491).\n- scsi: qla2xxx: Reserve extra IRQ vectors (bsc#1184436).\n- scsi: qla2xxx: Reuse existing error handling path (bsc#1185491).\n- scsi: qla2xxx: Simplify if statement (bsc#1185491).\n- scsi: qla2xxx: Simplify qla8044_minidump_process_control() (bsc#1185491).\n- scsi: qla2xxx: Simplify the calculation of variables (bsc#1185491).\n- scsi: qla2xxx: Suppress Coverity complaints about dseg_r* (bsc#1185491).\n- scsi: qla2xxx: Update default AER debug mask (bsc#1185491).\n- scsi: qla2xxx: Update version to 10.02.00.105-k (bsc#1185491).\n- scsi: qla2xxx: Update version to 10.02.00.106-k (bsc#1185491).\n- scsi: qla2xxx: Use dma_pool_zalloc() (bsc#1185491).\n- scsi: qla2xxx: Wait for ABTS response on I/O timeouts for NVMe (bsc#1185491).\n- scsi: qla2xxx: fc_remote_port_chkready() returns a SCSI result value (bsc#1185491).\n- scsi: smartpqi: Correct driver removal with HBA disks (bsc#1178089).\n- scsi: smartpqi: Correct driver removal with HBA disks (bsc#1178089).\n- scsi: smartpqi: Correct pqi_sas_smp_handler busy condition (bsc#1178089).\n- scsi: smartpqi: Correct pqi_sas_smp_handler busy condition (bsc#1178089).\n- scsi: smartpqi: Update version to 1.2.16-012 (bsc#1178089).\n- scsi: smartpqi: Update version to 1.2.16-012 (bsc#1178089).\n- scsi: target: pscsi: Avoid OOM in pscsi_map_sg() (bsc#1183843).\n- scsi: target: pscsi: Clean up after failure in pscsi_map_sg() (bsc#1183843).\n- scsi: target: tcmu: Fix use-after-free of se_cmd-\u003epriv (bsc#1186356).\n- scsi: target: tcmu: Fix warning: \u0027page\u0027 may be used uninitialized (bsc#1186357).\n- sctp: delay auto_asconf init until binding the first addr (\u0026lt;cover.1620748346.git.mkubecek@suse.cz\u003e).\n- security: keys: trusted: fix TPM2 authorizations (git-fixes).\n- selftests/bpf: Fix BPF_CORE_READ_BITFIELD() macro (bsc#1177028).\n- selftests/bpf: Fix the ASSERT_ERR_PTR macro (bsc#1177028).\n- selftests/bpf: Mask bpf_csum_diff() return value to 16 bits in test_verifier (bsc#1155518).\n- selftests/bpf: No need to drop the packet when there is no geneve opt (bsc#1155518).\n- selftests/bpf: Re-generate vmlinux.h and BPF skeletons if bpftool changed (bsc#1177028).\n- selftests/bpf: Set gopt opt_class to 0 if get tunnel opt failed (bsc#1155518).\n- selftests/powerpc: Add pkey helpers for rights (bsc#1184934 ltc#191460).\n- selftests/powerpc: Add test for execute-disabled pkeys (bsc#1184934 ltc#191460).\n- selftests/powerpc: Add test for pkey siginfo verification (bsc#1184934 ltc#191460).\n- selftests/powerpc: Add wrapper for gettid (bsc#1184934 ltc#191460).\n- selftests/powerpc: Fix L1D flushing tests for Power10 (bsc#1184934 ltc#191460).\n- selftests/powerpc: Fix exit status of pkey tests (bsc#1184934 ltc#191460).\n- selftests/powerpc: Fix pkey syscall redefinitions (bsc#1184934 ltc#191460).\n- selftests/powerpc: Move pkey helpers to headers (bsc#1184934 ltc#191460).\n- selftests/powerpc: refactor entry and rfi_flush tests (bsc#1184934 ltc#191460).\n- selftests: mlxsw: Remove a redundant if statement in tc_flower_scale test (bsc#1176774).\n- selinux: Fix error return code in sel_ib_pkey_sid_slow() (git-fixes).\n- selinux: fix error initialization in inode_doinit_with_dentry() (git-fixes).\n- selinux: fix inode_doinit_with_dentry() LABEL_INVALID error handling (git-fixes).\n- serial: core: fix suspicious security_locked_down() call (git-fixes).\n- serial: core: return early on unsupported ioctls (git-fixes).\n- serial: sh-sci: Fix off-by-one error in FIFO threshold register setting (git-fixes).\n- serial: stm32: fix incorrect characters on console (git-fixes).\n- serial: stm32: fix tx_empty condition (git-fixes).\n- serial: tegra: Fix a mask operation that is always true (git-fixes).\n- smb3: Fix out-of-bounds bug in SMB2_negotiate() (bsc#1183540).\n- smb3: add dynamic trace point to trace when credits obtained (bsc#1181507).\n- smb3: fix crediting for compounding when only one request in flight (bsc#1181507).\n- smc: disallow TCP_ULP in smc_setsockopt() (git-fixes).\n- soc/fsl: qbman: fix conflicting alignment attributes (git-fixes).\n- soc: aspeed: fix a ternary sign expansion bug (git-fixes).\n- soc: fsl: qe: replace qe_io{read,write}* wrappers by generic io{read,write}* (git-fixes).\n- soc: qcom: mdt_loader: Detect truncated read of segments (git-fixes).\n- soc: qcom: mdt_loader: Validate that p_filesz \u0026lt; p_memsz (git-fixes).\n- software node: Fix node registration (git-fixes).\n- soundwire: bus: Fix device found flag correctly (git-fixes).\n- soundwire: stream: fix memory leak in stream config error path (git-fixes).\n- spi: Introduce dspi_slave_abort() function for NXP\u0027s dspi SPI driver (bsc#1167260).\n- spi: ath79: always call chipselect function (git-fixes).\n- spi: ath79: remove spi-master setup and cleanup assignment (git-fixes).\n- spi: cadence: set cqspi to the driver_data field of struct device (git-fixes).\n- spi: dln2: Fix reference leak to master (git-fixes).\n- spi: fsl-dspi: fix NULL pointer dereference (bsc#1167260).\n- spi: fsl-dspi: fix use-after-free in remove path (bsc#1167260).\n- spi: fsl-dspi: fix wrong pointer in suspend/resume (bsc#1167260).\n- spi: fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware() (git-fixes).\n- spi: omap-100k: Fix reference leak to master (git-fixes).\n- spi: qup: fix PM reference leak in spi_qup_remove() (git-fixes).\n- spi: spi-fsl-dspi: Accelerate transfers using larger word size if possible (bsc#1167260).\n- spi: spi-fsl-dspi: Add comments around dspi_pop_tx and dspi_push_rx functions (bsc#1167260).\n- spi: spi-fsl-dspi: Add support for LS1028A (bsc#1167260).\n- spi: spi-fsl-dspi: Adding shutdown hook (bsc#1167260).\n- spi: spi-fsl-dspi: Always use the TCFQ devices in poll mode (bsc#1167260).\n- spi: spi-fsl-dspi: Avoid NULL pointer in dspi_slave_abort for non-DMA mode (bsc#1167260).\n- spi: spi-fsl-dspi: Avoid reading more data than written in EOQ mode (bsc#1167260).\n- spi: spi-fsl-dspi: Change usage pattern of SPI_MCR_* and SPI_CTAR_* macros (bsc#1167260).\n- spi: spi-fsl-dspi: Convert TCFQ users to XSPI FIFO mode (bsc#1167260).\n- spi: spi-fsl-dspi: Convert the instantiations that support it to DMA (bsc#1167260).\n- spi: spi-fsl-dspi: Demistify magic value in SPI_SR_CLEAR (bsc#1167260).\n- spi: spi-fsl-dspi: Do not access reserved fields in SPI_MCR (bsc#1167260).\n- spi: spi-fsl-dspi: Do not mask off undefined bits (bsc#1167260).\n- spi: spi-fsl-dspi: Exit the ISR with IRQ_NONE when it\u0027s not ours (bsc#1167260).\n- spi: spi-fsl-dspi: Fix 16-bit word order in 32-bit XSPI mode (bsc#1167260).\n- spi: spi-fsl-dspi: Fix a resource leak in an error handling path (git-fixes).\n- spi: spi-fsl-dspi: Fix bits-per-word acceleration in DMA mode (bsc#1167260).\n- spi: spi-fsl-dspi: Fix code alignment (bsc#1167260).\n- spi: spi-fsl-dspi: Fix external abort on interrupt in resume or exit paths (bsc#1167260).\n- spi: spi-fsl-dspi: Fix interrupt-less DMA mode taking an XSPI code path (bsc#1167260).\n- spi: spi-fsl-dspi: Fix little endian access to PUSHR CMD and TXDATA (bsc#1167260).\n- spi: spi-fsl-dspi: Fix lockup if device is removed during SPI transfer (bsc#1167260).\n- spi: spi-fsl-dspi: Fix lockup if device is shutdown during SPI transfer (bsc#1167260).\n- spi: spi-fsl-dspi: Fix race condition in TCFQ/EOQ interrupt (bsc#1167260).\n- spi: spi-fsl-dspi: Fix typos (bsc#1167260).\n- spi: spi-fsl-dspi: Free DMA memory with matching function (bsc#1167260).\n- spi: spi-fsl-dspi: Implement .max_message_size method for EOQ mode (bsc#1167260).\n- spi: spi-fsl-dspi: Initialize completion before possible interrupt (bsc#1167260).\n- spi: spi-fsl-dspi: LS2080A and LX2160A support XSPI mode (bsc#1167260).\n- spi: spi-fsl-dspi: Make bus-num property optional (bsc#1167260).\n- spi: spi-fsl-dspi: Move dspi_interrupt above dspi_transfer_one_message (bsc#1167260).\n- spi: spi-fsl-dspi: Move invariant configs out of dspi_transfer_one_message (bsc#1167260).\n- spi: spi-fsl-dspi: Optimize dspi_setup_accel for lowest interrupt count (bsc#1167260).\n- spi: spi-fsl-dspi: Parameterize the FIFO size and DMA buffer size (bsc#1167260).\n- spi: spi-fsl-dspi: Protect against races on dspi-\u003ewords_in_flight (bsc#1167260).\n- spi: spi-fsl-dspi: Reduce indentation in dspi_release_dma() (bsc#1167260).\n- spi: spi-fsl-dspi: Reduce indentation level in dspi_interrupt (bsc#1167260).\n- spi: spi-fsl-dspi: Remove impossible to reach error check (bsc#1167260).\n- spi: spi-fsl-dspi: Remove pointless assignment of master-\u003etransfer to NULL (bsc#1167260).\n- spi: spi-fsl-dspi: Remove unused chip-\u003evoid_write_data (bsc#1167260).\n- spi: spi-fsl-dspi: Remove unused defines and includes (bsc#1167260).\n- spi: spi-fsl-dspi: Remove unused initialization of \u0027ret\u0027 in dspi_probe (bsc#1167260).\n- spi: spi-fsl-dspi: Rename fifo_{read,write} and {tx,cmd}_fifo_write (bsc#1167260).\n- spi: spi-fsl-dspi: Replace interruptible wait queue with a simple completion (bsc#1167260).\n- spi: spi-fsl-dspi: Replace legacy spi_master names with spi_controller (bsc#1167260).\n- spi: spi-fsl-dspi: Simplify bytes_per_word gymnastics (bsc#1167260).\n- spi: spi-fsl-dspi: Take software timestamp in dspi_fifo_write (bsc#1167260).\n- spi: spi-fsl-dspi: Use BIT() and GENMASK() macros (bsc#1167260).\n- spi: spi-fsl-dspi: Use EOQ for last word in buffer even for XSPI mode (bsc#1167260).\n- spi: spi-fsl-dspi: Use dma_request_chan() instead dma_request_slave_channel() (bsc#1167260).\n- spi: spi-fsl-dspi: Use poll mode in case the platform IRQ is missing (bsc#1167260).\n- spi: spi-fsl-dspi: Use reverse Christmas tree declaration order (bsc#1167260).\n- spi: spi-fsl-dspi: Use specific compatible strings for all SoC instantiations (bsc#1167260).\n- spi: spi-fsl-dspi: delete EOQ transfer mode (bsc#1167260).\n- spi: spi-fsl-dspi: fix DMA mapping (bsc#1167260).\n- spi: spi-fsl-dspi: fix native data copy (bsc#1167260).\n- spi: spi-fsl-dspi: remove git-fixes Remove git-fixes. Prepare to update the driver. References: bsc#1167260\n- spi: spi-fsl-dspi: set ColdFire to DMA mode (bsc#1167260).\n- spi: spi-fsl-dspi: use XSPI mode instead of DMA for DPAA2 SoCs (bsc#1167260).\n- spi: spi-ti-qspi: Free DMA resources (git-fixes).\n- spi: stm32: make spurious and overrun interrupts visible (git-fixes).\n- squashfs: fix inode lookup sanity checks (bsc#1183750).\n- squashfs: fix xattr id and id lookup sanity checks (bsc#1183750).\n- staging: bcm2835-audio: Replace unsafe strcpy() with strscpy() (git-fixes).\n- staging: comedi: addi_apci_1032: Fix endian problem for COS sample (git-fixes).\n- staging: comedi: addi_apci_1500: Fix endian problem for command sample (git-fixes).\n- staging: comedi: adv_pci1710: Fix endian problem for AI command data (git-fixes).\n- staging: comedi: cb_pcidas64: fix request_irq() warn (git-fixes).\n- staging: comedi: cb_pcidas: fix request_irq() warn (git-fixes).\n- staging: comedi: das6402: Fix endian problem for AI command data (git-fixes).\n- staging: comedi: das800: Fix endian problem for AI command data (git-fixes).\n- staging: comedi: dmm32at: Fix endian problem for AI command data (git-fixes).\n- staging: comedi: me4000: Fix endian problem for AI command data (git-fixes).\n- staging: comedi: pcl711: Fix endian problem for AI command data (git-fixes).\n- staging: comedi: pcl818: Fix endian problem for AI command data (git-fixes).\n- staging: emxx_udc: fix loop in _nbu2ss_nuke() (git-fixes).\n- staging: fwserial: Fix error handling in fwserial_create (git-fixes).\n- staging: fwserial: fix TIOCGSERIAL implementation (git-fixes).\n- staging: fwserial: fix TIOCSSERIAL implementation (git-fixes).\n- staging: fwserial: fix TIOCSSERIAL jiffies conversions (git-fixes).\n- staging: fwserial: fix TIOCSSERIAL permission check (git-fixes).\n- staging: iio: cdc: ad7746: avoid overwrite of num_channels (git-fixes).\n- staging: ks7010: prevent buffer overflow in ks_wlan_set_scan() (git-fixes).\n- staging: most: sound: add sanity check for function argument (git-fixes).\n- staging: rtl8188eu: fix potential memory corruption in rtw_check_beacon_data() (git-fixes).\n- staging: rtl8188eu: prevent -\u003essid overflow in rtw_wx_set_scan() (git-fixes).\n- staging: rtl8192e: Change state information from u16 to u8 (git-fixes).\n- staging: rtl8192e: Fix incorrect source in memcpy() (git-fixes).\n- staging: rtl8192e: Fix possible buffer overflow in _rtl92e_wx_set_scan (git-fixes).\n- staging: rtl8192u: Fix potential infinite loop (git-fixes).\n- staging: rtl8192u: fix -\u003essid overflow in r8192_wx_set_scan() (git-fixes).\n- staging: rtl8712: Fix possible buffer overflow in r8712_sitesurvey_cmd (git-fixes).\n- staging: rtl8712: unterminated string leads to read overflow (git-fixes).\n- stop_machine: mark helpers __always_inline (git-fixes).\n- supported.conf:\n- supported.conf: add bsc1185010 dependency\n- supported.conf: mark usb_otg_fsm as supported (bsc#1185010)\n- tcp: fix to update snd_wl1 in bulk receiver fast path (\u0026lt;cover.1620748346.git.mkubecek@suse.cz\u003e).\n- tee: optee: remove need_resched() before cond_resched() (git-fixes).\n- tee: optee: replace might_sleep with cond_resched (git-fixes).\n- thermal/core: Add NULL pointer check before using cooling device stats (git-fixes).\n- thermal/drivers/cpufreq_cooling: Update cpufreq_state only if state has changed (git-fixes).\n- thermal/drivers/ti-soc-thermal/bandgap Remove unused variable \u0027val\u0027 (git-fixes).\n- thermal: thermal_of: Fix error return code of thermal_of_populate_bind_params() (git-fixes).\n- thunderbolt: Fix a leak in tb_retimer_add() (git-fixes).\n- thunderbolt: Fix a leak in tb_retimer_add() (git-fixes).\n- thunderbolt: Fix off by one in tb_port_find_retimer() (git-fixes).\n- thunderbolt: Fix off by one in tb_port_find_retimer() (git-fixes).\n- thunderbolt: Initialize HopID IDAs in tb_switch_alloc() (git-fixes).\n- thunderbolt: dma_port: Fix NVM read buffer bounds and offset issue (git-fixes).\n- tools/resolve_btfids: Fix build error with older host toolchains (bsc#1177028).\n- tpm: acpi: Check eventlog signature before using it (git-fixes).\n- tracing: Map all PIDs to command lines (git-fixes).\n- tty: amiserial: fix TIOCSSERIAL permission check (git-fixes).\n- tty: fix memory leak in vc_deallocate (git-fixes).\n- tty: moxa: fix TIOCSSERIAL jiffies conversions (git-fixes).\n- tty: moxa: fix TIOCSSERIAL permission check (git-fixes).\n- tty: serial: lpuart: fix lpuart32_write usage (git-fixes).\n- tty: serial: ucc_uart: replace qe_io{read,write}* wrappers by generic io{read,write}* (git-fixes).\n- udlfb: Fix memory leak in dlfb_usb_probe (git-fixes).\n- uio: uio_hv_generic: use devm_kzalloc() for private data alloc (git-fixes).\n- uio_hv_generic: Fix a memory leak in error handling paths (git-fixes).\n- uio_hv_generic: Fix another memory leak in error handling paths (git-fixes).\n- uio_hv_generic: add missed sysfs_remove_bin_file (git-fixes).\n- usb-storage: Add quirk to defeat Kindle\u0027s automatic unload (git-fixes).\n- usb: Remove dev_err() usage after platform_get_irq() (git-fixes).\n- usb: core: hub: Fix PM reference leak in usb_port_resume() (git-fixes).\n- usb: core: hub: fix race condition about TRSMRCY of resume (git-fixes).\n- usb: dwc2: Fix HPRT0.PrtSusp bit setting for HiKey 960 board (git-fixes).\n- usb: dwc2: Fix gadget DMA unmap direction (git-fixes).\n- usb: dwc2: Fix hibernation between host and device modes (git-fixes).\n- usb: dwc2: Fix host mode hibernation exit with remote wakeup flow (git-fixes).\n- usb: dwc2: Fix session request interrupt handler (git-fixes).\n- usb: dwc2: Prevent core suspend when port connection flag is 0 (git-fixes).\n- usb: dwc3: Switch to use device_property_count_u32() (git-fixes).\n- usb: dwc3: Update soft-reset wait polling rate (git-fixes).\n- usb: dwc3: gadget: Enable suspend events (git-fixes).\n- usb: dwc3: gadget: Fix START_TRANSFER link state check (git-fixes).\n- usb: dwc3: gadget: Return success always for kick transfer in ep queue (git-fixes).\n- usb: dwc3: keystone: use devm_platform_ioremap_resource() to simplify code (git-fixes).\n- usb: dwc3: meson-g12a: use devm_platform_ioremap_resource() to simplify code (git-fixes).\n- usb: dwc3: omap: improve extcon initialization (git-fixes).\n- usb: dwc3: pci: Enable usb2-gadget-lpm-disable for Intel Merrifield (git-fixes).\n- usb: dwc3: qcom: Add missing DWC3 OF node refcount decrement (git-fixes).\n- usb: dwc3: qcom: Honor wakeup enabled/disabled state (git-fixes).\n- usb: fotg210-hcd: Fix an error message (git-fixes).\n- usb: gadget/function/f_fs string table fix for multiple languages (git-fixes).\n- usb: gadget: Fix double free of device descriptor pointers (git-fixes).\n- usb: gadget: aspeed: fix dma map failure (git-fixes).\n- usb: gadget: configfs: Fix KASAN use-after-free (git-fixes).\n- usb: gadget: dummy_hcd: fix gpf in gadget_setup (git-fixes).\n- usb: gadget: f_uac1: stop playback on function disable (git-fixes).\n- usb: gadget: f_uac1: validate input parameters (git-fixes).\n- usb: gadget: f_uac2: always increase endpoint max_packet_size by one audio slot (git-fixes).\n- usb: gadget: f_uac2: validate input parameters (git-fixes).\n- usb: gadget: pch_udc: Check for DMA mapping error (git-fixes).\n- usb: gadget: pch_udc: Check if driver is present before calling -\u003esetup() (git-fixes).\n- usb: gadget: pch_udc: Move pch_udc_init() to satisfy kernel doc (git-fixes).\n- usb: gadget: pch_udc: Replace cpu_to_le32() by lower_32_bits() (git-fixes).\n- usb: gadget: pch_udc: Revert d3cb25a12138 completely (git-fixes).\n- usb: gadget: r8a66597: Add missing null check on return from platform_get_resource (git-fixes).\n- usb: gadget: udc: amd5536udc_pci fix null-ptr-dereference (git-fixes).\n- usb: gadget: udc: renesas_usb3: Fix a race in usb3_start_pipen() (git-fixes).\n- usb: gadget: uvc: add bInterval checking for HS mode (git-fixes).\n- usb: musb: Fix suspend with devices connected for a64 (git-fixes).\n- usb: musb: fix PM reference leak in musb_irq_work() (git-fixes).\n- usb: pci-quirks: disable D3cold on xhci suspend for s2idle on AMD Renoire (bsc#1185840).\n- usb: renesas_usbhs: Clear PIPECFG for re-enabling pipe with other EPNUM (git-fixes).\n- usb: roles: Call try_module_get() from usb_role_switch_find_by_fwnode() (git-fixes).\n- usb: roles: Call try_module_get() from usb_role_switch_find_by_fwnode() (git-fixes).\n- usb: sl811-hcd: improve misleading indentation (git-fixes).\n- usb: typec: Remove vdo[3] part of tps6598x_rx_identity_reg struct (git-fixes).\n- usb: typec: tcpci: Check ROLE_CONTROL while interpreting CC_STATUS (git-fixes).\n- usb: typec: tcpm: Address incorrect values of tcpm psy for fixed supply (git-fixes).\n- usb: typec: tcpm: Honour pSnkStdby requirement during negotiation (git-fixes).\n- usb: typec: tcpm: Invoke power_supply_changed for tcpm-source-psy- (git-fixes).\n- usb: typec: tcpm: Invoke power_supply_changed for tcpm-source-psy- (git-fixes).\n- usb: typec: tps6598x: Fix return value check in tps6598x_probe() (git-fixes).\n- usb: typec: tps6598x: Fix return value check in tps6598x_probe() (git-fixes).\n- usb: typec: ucsi: Put fwnode in any case during -\u003eprobe() (git-fixes).\n- usb: webcam: Invalid size of Processing Unit Descriptor (git-fixes).\n- usb: xhci-mtk: fix broken streams issue on 0.96 xHCI (git-fixes).\n- usb: xhci-mtk: improve bandwidth scheduling with TT (git-fixes).\n- usb: xhci-mtk: remove or operator for setting schedule parameters (git-fixes).\n- usb: xhci: Fix ASMedia ASM1042A and ASM3242 DMA addressing (git-fixes).\n- usb: xhci: Fix port minor revision (git-fixes).\n- usb: xhci: Increase timeout for HC halt (git-fixes).\n- usb: xhci: do not perform Soft Retry for some xHCI hosts (git-fixes).\n- usbip: Fix incorrect double assignment to udc-\u003eud.tcp_rx (git-fixes).\n- usbip: fix stub_dev to check for stream socket (git-fixes).\n- usbip: fix stub_dev usbip_sockfd_store() races leading to gpf (git-fixes).\n- usbip: fix vhci_hcd attach_store() races leading to gpf (git-fixes).\n- usbip: fix vhci_hcd to check for stream socket (git-fixes).\n- usbip: fix vudc to check for stream socket (git-fixes).\n- usbip: fix vudc usbip_sockfd_store races leading to gpf (git-fixes).\n- usbip: tools: fix build error for multiple definition (git-fixes).\n- usbip: vhci_hcd fix shift out-of-bounds in vhci_hub_control() (git-fixes).\n- use __netdev_notify_peers in ibmvnic (bsc#1183871 ltc#192139).\n- veth: Store queue_mapping independently of XDP prog presence (git-fixes).\n- vfio-pci/zdev: fix possible segmentation fault issue (git-fixes).\n- vfio/iommu_type1: Populate full dirty when detach non-pinned group (bsc#1183326).\n- vfio/mdev: Do not allow a mdev_type to have a NULL parent pointer (git-fixes).\n- vfio/mdev: Make to_mdev_device() into a static inline (git-fixes).\n- vfio/pci: Add missing range check in vfio_pci_mmap (git-fixes).\n- vfio/pci: Move VGA and VF initialization to functions (git-fixes).\n- vfio/pci: Re-order vfio_pci_probe() (git-fixes).\n- vgacon: Record video mode changes with VT_RESIZEX (git-fixes).\n- video: fbdev: acornfb: remove free_unused_pages() (bsc#1152489)\n- video: hyperv_fb: Add ratelimit on error message (bsc#1185725).\n- video: hyperv_fb: Fix a double free in hvfb_probe (git-fixes).\n- virt_wifi: Return micros for BSS TSF values (git-fixes).\n- virtiofs: fix memory leak in virtio_fs_probe() (bsc#1185558).\n- vrf: fix a comment about loopback device (git-fixes).\n- vt/consolemap: do font sum unsigned (git-fixes).\n- vxlan: do not modify the shared tunnel info when PMTU triggers an ICMP reply (bsc#1176447).\n- vxlan: move debug check after netdev unregister (git-fixes).\n- watchdog/softlockup: Remove obsolete check of last reported task (bsc#1185982).\n- watchdog/softlockup: report the overall time of softlockups (bsc#1185982).\n- watchdog: explicitly update timestamp when reporting softlockup (bsc#1185982).\n- watchdog: rename __touch_watchdog() to a better descriptive name (bsc#1185982).\n- whitespace cleanup\n- wl3501_cs: Fix out-of-bounds warnings in wl3501_mgmt_join (git-fixes).\n- wl3501_cs: Fix out-of-bounds warnings in wl3501_send_pkt (git-fixes).\n- wlcore: Fix command execute failure 19 for wl12xx (git-fixes).\n- workqueue: Minor follow-ups to the rescuer destruction change (bsc#1185911).\n- workqueue: Move the position of debug_work_activate() in __queue_work() (bsc#1184893).\n- workqueue: more destroy_workqueue() fixes (bsc#1185911).\n- x86,swiotlb: Adjust SWIOTLB bounce buffer size for SEV guests (bsc#1186219).\n- x86/cpu: Initialize MSR_TSC_AUX if RDTSCP *or* RDPID is supported (bsc#1152489).\n- x86/crash: Fix crash_setup_memmap_entries() out-of-bounds access (bsc#1152489).\n- x86/fsgsbase/64: Fix NULL deref in 86_fsgsbase_read_task (bsc#1152489).\n- x86/insn: Add some Intel instructions to the opcode map (bsc#1184760).\n- x86/insn: Add some more Intel instructions to the opcode map (bsc#1184760).\n- x86/ioapic: Ignore IRQ2 again (bsc#1152489).\n- x86/mem_encrypt: Correct physical address calculation in __set_clr_pte_enc() (bsc#1152489).\n- x86/microcode: Check for offline CPUs before requesting new microcode (bsc#1152489).\n- x86/mm: Fix NX bit clearing issue in kernel_map_pages_in_pgd (bsc#1152489).\n- x86/platform/uv: Set section block size for hubless architectures (bsc#1152489).\n- x86/reboot: Force all cpus to exit VMX root if VMX is supported (bsc#1152489).\n- x86/sev-es: Invalidate the GHCB after completing VMGEXIT (bsc#1178134).\n- x86/sev-es: Move sev_es_put_ghcb() in prep for follow on patch (bsc#1178134).\n- x86: Introduce TS_COMPAT_RESTART to fix get_nr_restart_syscall() (bsc#1152489).\n- xen/events: avoid handling the same event on two cpus at the same time (git-fixes).\n- xen/events: do not unmask an event channel when an eoi is pending (git-fixes).\n- xen/events: reset affinity of 2-level event when tearing it down (git-fixes).\n- xen/evtchn: Change irq_info lock to raw_spinlock_t (git-fixes). \n- xfrm: Provide private skb extensions for segmented and hw offloaded ESP packets (bsc#1176447).\n- xfs: group quota should return EDQUOT when prj quota enabled (bsc#1180980).\n- xhci: Do not use GFP_KERNEL in (potentially) atomic context (git-fixes).\n- xhci: Fix repeated xhci wake after suspend due to uncleared internal wake state (git-fixes).\n- xhci: Improve detection of device initiated wake signal (git-fixes).\n- xhci: check control context is valid before dereferencing it (git-fixes).\n- xhci: fix potential array out of bounds with several interrupters (git-fixes).\n- xsk: Respect device\u0027s headroom and tailroom on generic xmit path (git-fixes).\n- xsk: Respect device\u0027s headroom and tailroom on generic xmit path (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-SLE-15.3-2021-1975",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_1975-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2021:1975-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2021:1975-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/"
},
{
"category": "self",
"summary": "SUSE Bug 1043990",
"url": "https://bugzilla.suse.com/1043990"
},
{
"category": "self",
"summary": "SUSE Bug 1047233",
"url": "https://bugzilla.suse.com/1047233"
},
{
"category": "self",
"summary": "SUSE Bug 1055117",
"url": "https://bugzilla.suse.com/1055117"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1087082",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "self",
"summary": "SUSE Bug 1113295",
"url": "https://bugzilla.suse.com/1113295"
},
{
"category": "self",
"summary": "SUSE Bug 1133021",
"url": "https://bugzilla.suse.com/1133021"
},
{
"category": "self",
"summary": "SUSE Bug 1152457",
"url": "https://bugzilla.suse.com/1152457"
},
{
"category": "self",
"summary": "SUSE Bug 1152472",
"url": "https://bugzilla.suse.com/1152472"
},
{
"category": "self",
"summary": "SUSE Bug 1152489",
"url": "https://bugzilla.suse.com/1152489"
},
{
"category": "self",
"summary": "SUSE Bug 1153274",
"url": "https://bugzilla.suse.com/1153274"
},
{
"category": "self",
"summary": "SUSE Bug 1154353",
"url": "https://bugzilla.suse.com/1154353"
},
{
"category": "self",
"summary": "SUSE Bug 1155518",
"url": "https://bugzilla.suse.com/1155518"
},
{
"category": "self",
"summary": "SUSE Bug 1156256",
"url": "https://bugzilla.suse.com/1156256"
},
{
"category": "self",
"summary": "SUSE Bug 1156395",
"url": "https://bugzilla.suse.com/1156395"
},
{
"category": "self",
"summary": "SUSE Bug 1159280",
"url": "https://bugzilla.suse.com/1159280"
},
{
"category": "self",
"summary": "SUSE Bug 1160634",
"url": "https://bugzilla.suse.com/1160634"
},
{
"category": "self",
"summary": "SUSE Bug 1164648",
"url": "https://bugzilla.suse.com/1164648"
},
{
"category": "self",
"summary": "SUSE Bug 1167260",
"url": "https://bugzilla.suse.com/1167260"
},
{
"category": "self",
"summary": "SUSE Bug 1167574",
"url": "https://bugzilla.suse.com/1167574"
},
{
"category": "self",
"summary": "SUSE Bug 1167773",
"url": "https://bugzilla.suse.com/1167773"
},
{
"category": "self",
"summary": "SUSE Bug 1168777",
"url": "https://bugzilla.suse.com/1168777"
},
{
"category": "self",
"summary": "SUSE Bug 1168838",
"url": "https://bugzilla.suse.com/1168838"
},
{
"category": "self",
"summary": "SUSE Bug 1169709",
"url": "https://bugzilla.suse.com/1169709"
},
{
"category": "self",
"summary": "SUSE Bug 1171295",
"url": "https://bugzilla.suse.com/1171295"
},
{
"category": "self",
"summary": "SUSE Bug 1173485",
"url": "https://bugzilla.suse.com/1173485"
},
{
"category": "self",
"summary": "SUSE Bug 1174416",
"url": "https://bugzilla.suse.com/1174416"
},
{
"category": "self",
"summary": "SUSE Bug 1174426",
"url": "https://bugzilla.suse.com/1174426"
},
{
"category": "self",
"summary": "SUSE Bug 1175995",
"url": "https://bugzilla.suse.com/1175995"
},
{
"category": "self",
"summary": "SUSE Bug 1176447",
"url": "https://bugzilla.suse.com/1176447"
},
{
"category": "self",
"summary": "SUSE Bug 1176774",
"url": "https://bugzilla.suse.com/1176774"
},
{
"category": "self",
"summary": "SUSE Bug 1177028",
"url": "https://bugzilla.suse.com/1177028"
},
{
"category": "self",
"summary": "SUSE Bug 1177326",
"url": "https://bugzilla.suse.com/1177326"
},
{
"category": "self",
"summary": "SUSE Bug 1177411",
"url": "https://bugzilla.suse.com/1177411"
},
{
"category": "self",
"summary": "SUSE Bug 1177437",
"url": "https://bugzilla.suse.com/1177437"
},
{
"category": "self",
"summary": "SUSE Bug 1177666",
"url": "https://bugzilla.suse.com/1177666"
},
{
"category": "self",
"summary": "SUSE Bug 1178089",
"url": "https://bugzilla.suse.com/1178089"
},
{
"category": "self",
"summary": "SUSE Bug 1178134",
"url": "https://bugzilla.suse.com/1178134"
},
{
"category": "self",
"summary": "SUSE Bug 1178163",
"url": "https://bugzilla.suse.com/1178163"
},
{
"category": "self",
"summary": "SUSE Bug 1178181",
"url": "https://bugzilla.suse.com/1178181"
},
{
"category": "self",
"summary": "SUSE Bug 1178330",
"url": "https://bugzilla.suse.com/1178330"
},
{
"category": "self",
"summary": "SUSE Bug 1178378",
"url": "https://bugzilla.suse.com/1178378"
},
{
"category": "self",
"summary": "SUSE Bug 1178418",
"url": "https://bugzilla.suse.com/1178418"
},
{
"category": "self",
"summary": "SUSE Bug 1178612",
"url": "https://bugzilla.suse.com/1178612"
},
{
"category": "self",
"summary": "SUSE Bug 1179243",
"url": "https://bugzilla.suse.com/1179243"
},
{
"category": "self",
"summary": "SUSE Bug 1179454",
"url": "https://bugzilla.suse.com/1179454"
},
{
"category": "self",
"summary": "SUSE Bug 1179458",
"url": "https://bugzilla.suse.com/1179458"
},
{
"category": "self",
"summary": "SUSE Bug 1179519",
"url": "https://bugzilla.suse.com/1179519"
},
{
"category": "self",
"summary": "SUSE Bug 1179825",
"url": "https://bugzilla.suse.com/1179825"
},
{
"category": "self",
"summary": "SUSE Bug 1179827",
"url": "https://bugzilla.suse.com/1179827"
},
{
"category": "self",
"summary": "SUSE Bug 1179851",
"url": "https://bugzilla.suse.com/1179851"
},
{
"category": "self",
"summary": "SUSE Bug 1180100",
"url": "https://bugzilla.suse.com/1180100"
},
{
"category": "self",
"summary": "SUSE Bug 1180197",
"url": "https://bugzilla.suse.com/1180197"
},
{
"category": "self",
"summary": "SUSE Bug 1180814",
"url": "https://bugzilla.suse.com/1180814"
},
{
"category": "self",
"summary": "SUSE Bug 1180846",
"url": "https://bugzilla.suse.com/1180846"
},
{
"category": "self",
"summary": "SUSE Bug 1180980",
"url": "https://bugzilla.suse.com/1180980"
},
{
"category": "self",
"summary": "SUSE Bug 1181104",
"url": "https://bugzilla.suse.com/1181104"
},
{
"category": "self",
"summary": "SUSE Bug 1181161",
"url": "https://bugzilla.suse.com/1181161"
},
{
"category": "self",
"summary": "SUSE Bug 1181383",
"url": "https://bugzilla.suse.com/1181383"
},
{
"category": "self",
"summary": "SUSE Bug 1181507",
"url": "https://bugzilla.suse.com/1181507"
},
{
"category": "self",
"summary": "SUSE Bug 1181674",
"url": "https://bugzilla.suse.com/1181674"
},
{
"category": "self",
"summary": "SUSE Bug 1181862",
"url": "https://bugzilla.suse.com/1181862"
},
{
"category": "self",
"summary": "SUSE Bug 1182077",
"url": "https://bugzilla.suse.com/1182077"
},
{
"category": "self",
"summary": "SUSE Bug 1182257",
"url": "https://bugzilla.suse.com/1182257"
},
{
"category": "self",
"summary": "SUSE Bug 1182377",
"url": "https://bugzilla.suse.com/1182377"
},
{
"category": "self",
"summary": "SUSE Bug 1182378",
"url": "https://bugzilla.suse.com/1182378"
},
{
"category": "self",
"summary": "SUSE Bug 1182552",
"url": "https://bugzilla.suse.com/1182552"
},
{
"category": "self",
"summary": "SUSE Bug 1182574",
"url": "https://bugzilla.suse.com/1182574"
},
{
"category": "self",
"summary": "SUSE Bug 1182591",
"url": "https://bugzilla.suse.com/1182591"
},
{
"category": "self",
"summary": "SUSE Bug 1182613",
"url": "https://bugzilla.suse.com/1182613"
},
{
"category": "self",
"summary": "SUSE Bug 1182712",
"url": "https://bugzilla.suse.com/1182712"
},
{
"category": "self",
"summary": "SUSE Bug 1182713",
"url": "https://bugzilla.suse.com/1182713"
},
{
"category": "self",
"summary": "SUSE Bug 1182715",
"url": "https://bugzilla.suse.com/1182715"
},
{
"category": "self",
"summary": "SUSE Bug 1182716",
"url": "https://bugzilla.suse.com/1182716"
},
{
"category": "self",
"summary": "SUSE Bug 1182717",
"url": "https://bugzilla.suse.com/1182717"
},
{
"category": "self",
"summary": "SUSE Bug 1182999",
"url": "https://bugzilla.suse.com/1182999"
},
{
"category": "self",
"summary": "SUSE Bug 1183022",
"url": "https://bugzilla.suse.com/1183022"
},
{
"category": "self",
"summary": "SUSE Bug 1183048",
"url": "https://bugzilla.suse.com/1183048"
},
{
"category": "self",
"summary": "SUSE Bug 1183069",
"url": "https://bugzilla.suse.com/1183069"
},
{
"category": "self",
"summary": "SUSE Bug 1183077",
"url": "https://bugzilla.suse.com/1183077"
},
{
"category": "self",
"summary": "SUSE Bug 1183095",
"url": "https://bugzilla.suse.com/1183095"
},
{
"category": "self",
"summary": "SUSE Bug 1183120",
"url": "https://bugzilla.suse.com/1183120"
},
{
"category": "self",
"summary": "SUSE Bug 1183203",
"url": "https://bugzilla.suse.com/1183203"
},
{
"category": "self",
"summary": "SUSE Bug 1183249",
"url": "https://bugzilla.suse.com/1183249"
},
{
"category": "self",
"summary": "SUSE Bug 1183252",
"url": "https://bugzilla.suse.com/1183252"
},
{
"category": "self",
"summary": "SUSE Bug 1183277",
"url": "https://bugzilla.suse.com/1183277"
},
{
"category": "self",
"summary": "SUSE Bug 1183278",
"url": "https://bugzilla.suse.com/1183278"
},
{
"category": "self",
"summary": "SUSE Bug 1183279",
"url": "https://bugzilla.suse.com/1183279"
},
{
"category": "self",
"summary": "SUSE Bug 1183280",
"url": "https://bugzilla.suse.com/1183280"
},
{
"category": "self",
"summary": "SUSE Bug 1183281",
"url": "https://bugzilla.suse.com/1183281"
},
{
"category": "self",
"summary": "SUSE Bug 1183282",
"url": "https://bugzilla.suse.com/1183282"
},
{
"category": "self",
"summary": "SUSE Bug 1183283",
"url": "https://bugzilla.suse.com/1183283"
},
{
"category": "self",
"summary": "SUSE Bug 1183284",
"url": "https://bugzilla.suse.com/1183284"
},
{
"category": "self",
"summary": "SUSE Bug 1183285",
"url": "https://bugzilla.suse.com/1183285"
},
{
"category": "self",
"summary": "SUSE Bug 1183286",
"url": "https://bugzilla.suse.com/1183286"
},
{
"category": "self",
"summary": "SUSE Bug 1183287",
"url": "https://bugzilla.suse.com/1183287"
},
{
"category": "self",
"summary": "SUSE Bug 1183288",
"url": "https://bugzilla.suse.com/1183288"
},
{
"category": "self",
"summary": "SUSE Bug 1183289",
"url": "https://bugzilla.suse.com/1183289"
},
{
"category": "self",
"summary": "SUSE Bug 1183310",
"url": "https://bugzilla.suse.com/1183310"
},
{
"category": "self",
"summary": "SUSE Bug 1183311",
"url": "https://bugzilla.suse.com/1183311"
},
{
"category": "self",
"summary": "SUSE Bug 1183312",
"url": "https://bugzilla.suse.com/1183312"
},
{
"category": "self",
"summary": "SUSE Bug 1183313",
"url": "https://bugzilla.suse.com/1183313"
},
{
"category": "self",
"summary": "SUSE Bug 1183314",
"url": "https://bugzilla.suse.com/1183314"
},
{
"category": "self",
"summary": "SUSE Bug 1183315",
"url": "https://bugzilla.suse.com/1183315"
},
{
"category": "self",
"summary": "SUSE Bug 1183316",
"url": "https://bugzilla.suse.com/1183316"
},
{
"category": "self",
"summary": "SUSE Bug 1183317",
"url": "https://bugzilla.suse.com/1183317"
},
{
"category": "self",
"summary": "SUSE Bug 1183318",
"url": "https://bugzilla.suse.com/1183318"
},
{
"category": "self",
"summary": "SUSE Bug 1183319",
"url": "https://bugzilla.suse.com/1183319"
},
{
"category": "self",
"summary": "SUSE Bug 1183320",
"url": "https://bugzilla.suse.com/1183320"
},
{
"category": "self",
"summary": "SUSE Bug 1183321",
"url": "https://bugzilla.suse.com/1183321"
},
{
"category": "self",
"summary": "SUSE Bug 1183322",
"url": "https://bugzilla.suse.com/1183322"
},
{
"category": "self",
"summary": "SUSE Bug 1183323",
"url": "https://bugzilla.suse.com/1183323"
},
{
"category": "self",
"summary": "SUSE Bug 1183324",
"url": "https://bugzilla.suse.com/1183324"
},
{
"category": "self",
"summary": "SUSE Bug 1183325",
"url": "https://bugzilla.suse.com/1183325"
},
{
"category": "self",
"summary": "SUSE Bug 1183326",
"url": "https://bugzilla.suse.com/1183326"
},
{
"category": "self",
"summary": "SUSE Bug 1183346",
"url": "https://bugzilla.suse.com/1183346"
},
{
"category": "self",
"summary": "SUSE Bug 1183366",
"url": "https://bugzilla.suse.com/1183366"
},
{
"category": "self",
"summary": "SUSE Bug 1183369",
"url": "https://bugzilla.suse.com/1183369"
},
{
"category": "self",
"summary": "SUSE Bug 1183386",
"url": "https://bugzilla.suse.com/1183386"
},
{
"category": "self",
"summary": "SUSE Bug 1183405",
"url": "https://bugzilla.suse.com/1183405"
},
{
"category": "self",
"summary": "SUSE Bug 1183412",
"url": "https://bugzilla.suse.com/1183412"
},
{
"category": "self",
"summary": "SUSE Bug 1183427",
"url": "https://bugzilla.suse.com/1183427"
},
{
"category": "self",
"summary": "SUSE Bug 1183428",
"url": "https://bugzilla.suse.com/1183428"
},
{
"category": "self",
"summary": "SUSE Bug 1183445",
"url": "https://bugzilla.suse.com/1183445"
},
{
"category": "self",
"summary": "SUSE Bug 1183447",
"url": "https://bugzilla.suse.com/1183447"
},
{
"category": "self",
"summary": "SUSE Bug 1183491",
"url": "https://bugzilla.suse.com/1183491"
},
{
"category": "self",
"summary": "SUSE Bug 1183501",
"url": "https://bugzilla.suse.com/1183501"
},
{
"category": "self",
"summary": "SUSE Bug 1183509",
"url": "https://bugzilla.suse.com/1183509"
},
{
"category": "self",
"summary": "SUSE Bug 1183530",
"url": "https://bugzilla.suse.com/1183530"
},
{
"category": "self",
"summary": "SUSE Bug 1183534",
"url": "https://bugzilla.suse.com/1183534"
},
{
"category": "self",
"summary": "SUSE Bug 1183540",
"url": "https://bugzilla.suse.com/1183540"
},
{
"category": "self",
"summary": "SUSE Bug 1183593",
"url": "https://bugzilla.suse.com/1183593"
},
{
"category": "self",
"summary": "SUSE Bug 1183596",
"url": "https://bugzilla.suse.com/1183596"
},
{
"category": "self",
"summary": "SUSE Bug 1183598",
"url": "https://bugzilla.suse.com/1183598"
},
{
"category": "self",
"summary": "SUSE Bug 1183637",
"url": "https://bugzilla.suse.com/1183637"
},
{
"category": "self",
"summary": "SUSE Bug 1183646",
"url": "https://bugzilla.suse.com/1183646"
},
{
"category": "self",
"summary": "SUSE Bug 1183658",
"url": "https://bugzilla.suse.com/1183658"
},
{
"category": "self",
"summary": "SUSE Bug 1183662",
"url": "https://bugzilla.suse.com/1183662"
},
{
"category": "self",
"summary": "SUSE Bug 1183686",
"url": "https://bugzilla.suse.com/1183686"
},
{
"category": "self",
"summary": "SUSE Bug 1183692",
"url": "https://bugzilla.suse.com/1183692"
},
{
"category": "self",
"summary": "SUSE Bug 1183696",
"url": "https://bugzilla.suse.com/1183696"
},
{
"category": "self",
"summary": "SUSE Bug 1183750",
"url": "https://bugzilla.suse.com/1183750"
},
{
"category": "self",
"summary": "SUSE Bug 1183757",
"url": "https://bugzilla.suse.com/1183757"
},
{
"category": "self",
"summary": "SUSE Bug 1183775",
"url": "https://bugzilla.suse.com/1183775"
},
{
"category": "self",
"summary": "SUSE Bug 1183815",
"url": "https://bugzilla.suse.com/1183815"
},
{
"category": "self",
"summary": "SUSE Bug 1183843",
"url": "https://bugzilla.suse.com/1183843"
},
{
"category": "self",
"summary": "SUSE Bug 1183859",
"url": "https://bugzilla.suse.com/1183859"
},
{
"category": "self",
"summary": "SUSE Bug 1183868",
"url": "https://bugzilla.suse.com/1183868"
},
{
"category": "self",
"summary": "SUSE Bug 1183871",
"url": "https://bugzilla.suse.com/1183871"
},
{
"category": "self",
"summary": "SUSE Bug 1183873",
"url": "https://bugzilla.suse.com/1183873"
},
{
"category": "self",
"summary": "SUSE Bug 1183932",
"url": "https://bugzilla.suse.com/1183932"
},
{
"category": "self",
"summary": "SUSE Bug 1183947",
"url": "https://bugzilla.suse.com/1183947"
},
{
"category": "self",
"summary": "SUSE Bug 1183976",
"url": "https://bugzilla.suse.com/1183976"
},
{
"category": "self",
"summary": "SUSE Bug 1184074",
"url": "https://bugzilla.suse.com/1184074"
},
{
"category": "self",
"summary": "SUSE Bug 1184081",
"url": "https://bugzilla.suse.com/1184081"
},
{
"category": "self",
"summary": "SUSE Bug 1184082",
"url": "https://bugzilla.suse.com/1184082"
},
{
"category": "self",
"summary": "SUSE Bug 1184120",
"url": "https://bugzilla.suse.com/1184120"
},
{
"category": "self",
"summary": "SUSE Bug 1184167",
"url": "https://bugzilla.suse.com/1184167"
},
{
"category": "self",
"summary": "SUSE Bug 1184168",
"url": "https://bugzilla.suse.com/1184168"
},
{
"category": "self",
"summary": "SUSE Bug 1184170",
"url": "https://bugzilla.suse.com/1184170"
},
{
"category": "self",
"summary": "SUSE Bug 1184171",
"url": "https://bugzilla.suse.com/1184171"
},
{
"category": "self",
"summary": "SUSE Bug 1184176",
"url": "https://bugzilla.suse.com/1184176"
},
{
"category": "self",
"summary": "SUSE Bug 1184192",
"url": "https://bugzilla.suse.com/1184192"
},
{
"category": "self",
"summary": "SUSE Bug 1184193",
"url": "https://bugzilla.suse.com/1184193"
},
{
"category": "self",
"summary": "SUSE Bug 1184194",
"url": "https://bugzilla.suse.com/1184194"
},
{
"category": "self",
"summary": "SUSE Bug 1184196",
"url": "https://bugzilla.suse.com/1184196"
},
{
"category": "self",
"summary": "SUSE Bug 1184197",
"url": "https://bugzilla.suse.com/1184197"
},
{
"category": "self",
"summary": "SUSE Bug 1184198",
"url": "https://bugzilla.suse.com/1184198"
},
{
"category": "self",
"summary": "SUSE Bug 1184199",
"url": "https://bugzilla.suse.com/1184199"
},
{
"category": "self",
"summary": "SUSE Bug 1184208",
"url": "https://bugzilla.suse.com/1184208"
},
{
"category": "self",
"summary": "SUSE Bug 1184209",
"url": "https://bugzilla.suse.com/1184209"
},
{
"category": "self",
"summary": "SUSE Bug 1184211",
"url": "https://bugzilla.suse.com/1184211"
},
{
"category": "self",
"summary": "SUSE Bug 1184217",
"url": "https://bugzilla.suse.com/1184217"
},
{
"category": "self",
"summary": "SUSE Bug 1184218",
"url": "https://bugzilla.suse.com/1184218"
},
{
"category": "self",
"summary": "SUSE Bug 1184219",
"url": "https://bugzilla.suse.com/1184219"
},
{
"category": "self",
"summary": "SUSE Bug 1184220",
"url": "https://bugzilla.suse.com/1184220"
},
{
"category": "self",
"summary": "SUSE Bug 1184224",
"url": "https://bugzilla.suse.com/1184224"
},
{
"category": "self",
"summary": "SUSE Bug 1184259",
"url": "https://bugzilla.suse.com/1184259"
},
{
"category": "self",
"summary": "SUSE Bug 1184264",
"url": "https://bugzilla.suse.com/1184264"
},
{
"category": "self",
"summary": "SUSE Bug 1184386",
"url": "https://bugzilla.suse.com/1184386"
},
{
"category": "self",
"summary": "SUSE Bug 1184388",
"url": "https://bugzilla.suse.com/1184388"
},
{
"category": "self",
"summary": "SUSE Bug 1184391",
"url": "https://bugzilla.suse.com/1184391"
},
{
"category": "self",
"summary": "SUSE Bug 1184393",
"url": "https://bugzilla.suse.com/1184393"
},
{
"category": "self",
"summary": "SUSE Bug 1184436",
"url": "https://bugzilla.suse.com/1184436"
},
{
"category": "self",
"summary": "SUSE Bug 1184485",
"url": "https://bugzilla.suse.com/1184485"
},
{
"category": "self",
"summary": "SUSE Bug 1184509",
"url": "https://bugzilla.suse.com/1184509"
},
{
"category": "self",
"summary": "SUSE Bug 1184511",
"url": "https://bugzilla.suse.com/1184511"
},
{
"category": "self",
"summary": "SUSE Bug 1184512",
"url": "https://bugzilla.suse.com/1184512"
},
{
"category": "self",
"summary": "SUSE Bug 1184514",
"url": "https://bugzilla.suse.com/1184514"
},
{
"category": "self",
"summary": "SUSE Bug 1184583",
"url": "https://bugzilla.suse.com/1184583"
},
{
"category": "self",
"summary": "SUSE Bug 1184585",
"url": "https://bugzilla.suse.com/1184585"
},
{
"category": "self",
"summary": "SUSE Bug 1184611",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "self",
"summary": "SUSE Bug 1184615",
"url": "https://bugzilla.suse.com/1184615"
},
{
"category": "self",
"summary": "SUSE Bug 1184650",
"url": "https://bugzilla.suse.com/1184650"
},
{
"category": "self",
"summary": "SUSE Bug 1184710",
"url": "https://bugzilla.suse.com/1184710"
},
{
"category": "self",
"summary": "SUSE Bug 1184724",
"url": "https://bugzilla.suse.com/1184724"
},
{
"category": "self",
"summary": "SUSE Bug 1184728",
"url": "https://bugzilla.suse.com/1184728"
},
{
"category": "self",
"summary": "SUSE Bug 1184730",
"url": "https://bugzilla.suse.com/1184730"
},
{
"category": "self",
"summary": "SUSE Bug 1184731",
"url": "https://bugzilla.suse.com/1184731"
},
{
"category": "self",
"summary": "SUSE Bug 1184736",
"url": "https://bugzilla.suse.com/1184736"
},
{
"category": "self",
"summary": "SUSE Bug 1184737",
"url": "https://bugzilla.suse.com/1184737"
},
{
"category": "self",
"summary": "SUSE Bug 1184738",
"url": "https://bugzilla.suse.com/1184738"
},
{
"category": "self",
"summary": "SUSE Bug 1184740",
"url": "https://bugzilla.suse.com/1184740"
},
{
"category": "self",
"summary": "SUSE Bug 1184741",
"url": "https://bugzilla.suse.com/1184741"
},
{
"category": "self",
"summary": "SUSE Bug 1184742",
"url": "https://bugzilla.suse.com/1184742"
},
{
"category": "self",
"summary": "SUSE Bug 1184760",
"url": "https://bugzilla.suse.com/1184760"
},
{
"category": "self",
"summary": "SUSE Bug 1184769",
"url": "https://bugzilla.suse.com/1184769"
},
{
"category": "self",
"summary": "SUSE Bug 1184811",
"url": "https://bugzilla.suse.com/1184811"
},
{
"category": "self",
"summary": "SUSE Bug 1184855",
"url": "https://bugzilla.suse.com/1184855"
},
{
"category": "self",
"summary": "SUSE Bug 1184893",
"url": "https://bugzilla.suse.com/1184893"
},
{
"category": "self",
"summary": "SUSE Bug 1184934",
"url": "https://bugzilla.suse.com/1184934"
},
{
"category": "self",
"summary": "SUSE Bug 1184942",
"url": "https://bugzilla.suse.com/1184942"
},
{
"category": "self",
"summary": "SUSE Bug 1184943",
"url": "https://bugzilla.suse.com/1184943"
},
{
"category": "self",
"summary": "SUSE Bug 1184952",
"url": "https://bugzilla.suse.com/1184952"
},
{
"category": "self",
"summary": "SUSE Bug 1184953",
"url": "https://bugzilla.suse.com/1184953"
},
{
"category": "self",
"summary": "SUSE Bug 1184955",
"url": "https://bugzilla.suse.com/1184955"
},
{
"category": "self",
"summary": "SUSE Bug 1184957",
"url": "https://bugzilla.suse.com/1184957"
},
{
"category": "self",
"summary": "SUSE Bug 1184969",
"url": "https://bugzilla.suse.com/1184969"
},
{
"category": "self",
"summary": "SUSE Bug 1184984",
"url": "https://bugzilla.suse.com/1184984"
},
{
"category": "self",
"summary": "SUSE Bug 1185010",
"url": "https://bugzilla.suse.com/1185010"
},
{
"category": "self",
"summary": "SUSE Bug 1185041",
"url": "https://bugzilla.suse.com/1185041"
},
{
"category": "self",
"summary": "SUSE Bug 1185110",
"url": "https://bugzilla.suse.com/1185110"
},
{
"category": "self",
"summary": "SUSE Bug 1185113",
"url": "https://bugzilla.suse.com/1185113"
},
{
"category": "self",
"summary": "SUSE Bug 1185233",
"url": "https://bugzilla.suse.com/1185233"
},
{
"category": "self",
"summary": "SUSE Bug 1185269",
"url": "https://bugzilla.suse.com/1185269"
},
{
"category": "self",
"summary": "SUSE Bug 1185365",
"url": "https://bugzilla.suse.com/1185365"
},
{
"category": "self",
"summary": "SUSE Bug 1185428",
"url": "https://bugzilla.suse.com/1185428"
},
{
"category": "self",
"summary": "SUSE Bug 1185454",
"url": "https://bugzilla.suse.com/1185454"
},
{
"category": "self",
"summary": "SUSE Bug 1185472",
"url": "https://bugzilla.suse.com/1185472"
},
{
"category": "self",
"summary": "SUSE Bug 1185491",
"url": "https://bugzilla.suse.com/1185491"
},
{
"category": "self",
"summary": "SUSE Bug 1185495",
"url": "https://bugzilla.suse.com/1185495"
},
{
"category": "self",
"summary": "SUSE Bug 1185497",
"url": "https://bugzilla.suse.com/1185497"
},
{
"category": "self",
"summary": "SUSE Bug 1185549",
"url": "https://bugzilla.suse.com/1185549"
},
{
"category": "self",
"summary": "SUSE Bug 1185550",
"url": "https://bugzilla.suse.com/1185550"
},
{
"category": "self",
"summary": "SUSE Bug 1185558",
"url": "https://bugzilla.suse.com/1185558"
},
{
"category": "self",
"summary": "SUSE Bug 1185573",
"url": "https://bugzilla.suse.com/1185573"
},
{
"category": "self",
"summary": "SUSE Bug 1185581",
"url": "https://bugzilla.suse.com/1185581"
},
{
"category": "self",
"summary": "SUSE Bug 1185586",
"url": "https://bugzilla.suse.com/1185586"
},
{
"category": "self",
"summary": "SUSE Bug 1185587",
"url": "https://bugzilla.suse.com/1185587"
},
{
"category": "self",
"summary": "SUSE Bug 1185589",
"url": "https://bugzilla.suse.com/1185589"
},
{
"category": "self",
"summary": "SUSE Bug 1185606",
"url": "https://bugzilla.suse.com/1185606"
},
{
"category": "self",
"summary": "SUSE Bug 1185640",
"url": "https://bugzilla.suse.com/1185640"
},
{
"category": "self",
"summary": "SUSE Bug 1185641",
"url": "https://bugzilla.suse.com/1185641"
},
{
"category": "self",
"summary": "SUSE Bug 1185642",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "self",
"summary": "SUSE Bug 1185645",
"url": "https://bugzilla.suse.com/1185645"
},
{
"category": "self",
"summary": "SUSE Bug 1185670",
"url": "https://bugzilla.suse.com/1185670"
},
{
"category": "self",
"summary": "SUSE Bug 1185677",
"url": "https://bugzilla.suse.com/1185677"
},
{
"category": "self",
"summary": "SUSE Bug 1185680",
"url": "https://bugzilla.suse.com/1185680"
},
{
"category": "self",
"summary": "SUSE Bug 1185703",
"url": "https://bugzilla.suse.com/1185703"
},
{
"category": "self",
"summary": "SUSE Bug 1185725",
"url": "https://bugzilla.suse.com/1185725"
},
{
"category": "self",
"summary": "SUSE Bug 1185736",
"url": "https://bugzilla.suse.com/1185736"
},
{
"category": "self",
"summary": "SUSE Bug 1185758",
"url": "https://bugzilla.suse.com/1185758"
},
{
"category": "self",
"summary": "SUSE Bug 1185796",
"url": "https://bugzilla.suse.com/1185796"
},
{
"category": "self",
"summary": "SUSE Bug 1185840",
"url": "https://bugzilla.suse.com/1185840"
},
{
"category": "self",
"summary": "SUSE Bug 1185857",
"url": "https://bugzilla.suse.com/1185857"
},
{
"category": "self",
"summary": "SUSE Bug 1185859",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "self",
"summary": "SUSE Bug 1185860",
"url": "https://bugzilla.suse.com/1185860"
},
{
"category": "self",
"summary": "SUSE Bug 1185861",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "self",
"summary": "SUSE Bug 1185862",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "self",
"summary": "SUSE Bug 1185863",
"url": "https://bugzilla.suse.com/1185863"
},
{
"category": "self",
"summary": "SUSE Bug 1185898",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "self",
"summary": "SUSE Bug 1185899",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "self",
"summary": "SUSE Bug 1185911",
"url": "https://bugzilla.suse.com/1185911"
},
{
"category": "self",
"summary": "SUSE Bug 1185938",
"url": "https://bugzilla.suse.com/1185938"
},
{
"category": "self",
"summary": "SUSE Bug 1185950",
"url": "https://bugzilla.suse.com/1185950"
},
{
"category": "self",
"summary": "SUSE Bug 1185954",
"url": "https://bugzilla.suse.com/1185954"
},
{
"category": "self",
"summary": "SUSE Bug 1185980",
"url": "https://bugzilla.suse.com/1185980"
},
{
"category": "self",
"summary": "SUSE Bug 1185982",
"url": "https://bugzilla.suse.com/1185982"
},
{
"category": "self",
"summary": "SUSE Bug 1185987",
"url": "https://bugzilla.suse.com/1185987"
},
{
"category": "self",
"summary": "SUSE Bug 1185988",
"url": "https://bugzilla.suse.com/1185988"
},
{
"category": "self",
"summary": "SUSE Bug 1186009",
"url": "https://bugzilla.suse.com/1186009"
},
{
"category": "self",
"summary": "SUSE Bug 1186060",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "self",
"summary": "SUSE Bug 1186061",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "self",
"summary": "SUSE Bug 1186062",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "self",
"summary": "SUSE Bug 1186111",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "self",
"summary": "SUSE Bug 1186118",
"url": "https://bugzilla.suse.com/1186118"
},
{
"category": "self",
"summary": "SUSE Bug 1186219",
"url": "https://bugzilla.suse.com/1186219"
},
{
"category": "self",
"summary": "SUSE Bug 1186285",
"url": "https://bugzilla.suse.com/1186285"
},
{
"category": "self",
"summary": "SUSE Bug 1186320",
"url": "https://bugzilla.suse.com/1186320"
},
{
"category": "self",
"summary": "SUSE Bug 1186349",
"url": "https://bugzilla.suse.com/1186349"
},
{
"category": "self",
"summary": "SUSE Bug 1186352",
"url": "https://bugzilla.suse.com/1186352"
},
{
"category": "self",
"summary": "SUSE Bug 1186353",
"url": "https://bugzilla.suse.com/1186353"
},
{
"category": "self",
"summary": "SUSE Bug 1186354",
"url": "https://bugzilla.suse.com/1186354"
},
{
"category": "self",
"summary": "SUSE Bug 1186355",
"url": "https://bugzilla.suse.com/1186355"
},
{
"category": "self",
"summary": "SUSE Bug 1186356",
"url": "https://bugzilla.suse.com/1186356"
},
{
"category": "self",
"summary": "SUSE Bug 1186357",
"url": "https://bugzilla.suse.com/1186357"
},
{
"category": "self",
"summary": "SUSE Bug 1186390",
"url": "https://bugzilla.suse.com/1186390"
},
{
"category": "self",
"summary": "SUSE Bug 1186401",
"url": "https://bugzilla.suse.com/1186401"
},
{
"category": "self",
"summary": "SUSE Bug 1186408",
"url": "https://bugzilla.suse.com/1186408"
},
{
"category": "self",
"summary": "SUSE Bug 1186416",
"url": "https://bugzilla.suse.com/1186416"
},
{
"category": "self",
"summary": "SUSE Bug 1186439",
"url": "https://bugzilla.suse.com/1186439"
},
{
"category": "self",
"summary": "SUSE Bug 1186441",
"url": "https://bugzilla.suse.com/1186441"
},
{
"category": "self",
"summary": "SUSE Bug 1186451",
"url": "https://bugzilla.suse.com/1186451"
},
{
"category": "self",
"summary": "SUSE Bug 1186460",
"url": "https://bugzilla.suse.com/1186460"
},
{
"category": "self",
"summary": "SUSE Bug 1186467",
"url": "https://bugzilla.suse.com/1186467"
},
{
"category": "self",
"summary": "SUSE Bug 1186479",
"url": "https://bugzilla.suse.com/1186479"
},
{
"category": "self",
"summary": "SUSE Bug 1186484",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "self",
"summary": "SUSE Bug 1186498",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "self",
"summary": "SUSE Bug 1186501",
"url": "https://bugzilla.suse.com/1186501"
},
{
"category": "self",
"summary": "SUSE Bug 1186512",
"url": "https://bugzilla.suse.com/1186512"
},
{
"category": "self",
"summary": "SUSE Bug 1186573",
"url": "https://bugzilla.suse.com/1186573"
},
{
"category": "self",
"summary": "SUSE Bug 1186681",
"url": "https://bugzilla.suse.com/1186681"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18814 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18814/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19769 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19769/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24586 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24587 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24587/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24588 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25670 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25670/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25671 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25671/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25672 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25672/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25673 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25673/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26139 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26141 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26145 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26145/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26147 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-27170 page",
"url": "https://www.suse.com/security/cve/CVE-2020-27170/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-27171 page",
"url": "https://www.suse.com/security/cve/CVE-2020-27171/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-27673 page",
"url": "https://www.suse.com/security/cve/CVE-2020-27673/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-27815 page",
"url": "https://www.suse.com/security/cve/CVE-2020-27815/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-35519 page",
"url": "https://www.suse.com/security/cve/CVE-2020-35519/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36310 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36310/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36311 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36311/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36312 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36312/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36322 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36322/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20268 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20268/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23134 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-27363 page",
"url": "https://www.suse.com/security/cve/CVE-2021-27363/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-27364 page",
"url": "https://www.suse.com/security/cve/CVE-2021-27364/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-27365 page",
"url": "https://www.suse.com/security/cve/CVE-2021-27365/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28038 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28038/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28375 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28375/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28660 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28660/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28688 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28688/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28950 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28950/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28952 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28952/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28964 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28964/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28971 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28971/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28972 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28972/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-29154 page",
"url": "https://www.suse.com/security/cve/CVE-2021-29154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-29155 page",
"url": "https://www.suse.com/security/cve/CVE-2021-29155/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-29264 page",
"url": "https://www.suse.com/security/cve/CVE-2021-29264/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-29265 page",
"url": "https://www.suse.com/security/cve/CVE-2021-29265/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-29647 page",
"url": "https://www.suse.com/security/cve/CVE-2021-29647/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-29650 page",
"url": "https://www.suse.com/security/cve/CVE-2021-29650/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30002 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30002/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32399 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33034 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33034/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33200 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3428 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3428/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3444 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3444/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3483 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3483/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3489 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3489/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3490 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3490/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3491 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3491/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-07-11T13:00:28Z",
"generator": {
"date": "2021-07-11T13:00:28Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2021:1975-1",
"initial_release_date": "2021-07-11T13:00:28Z",
"revision_history": [
{
"date": "2021-07-11T13:00:28Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-azure-5.3.18-38.3.1.noarch",
"product": {
"name": "kernel-devel-azure-5.3.18-38.3.1.noarch",
"product_id": "kernel-devel-azure-5.3.18-38.3.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-azure-5.3.18-38.3.1.noarch",
"product": {
"name": "kernel-source-azure-5.3.18-38.3.1.noarch",
"product_id": "kernel-source-azure-5.3.18-38.3.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"product": {
"name": "cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"product_id": "cluster-md-kmp-azure-5.3.18-38.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"product": {
"name": "dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"product_id": "dlm-kmp-azure-5.3.18-38.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"product": {
"name": "gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"product_id": "gfs2-kmp-azure-5.3.18-38.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-5.3.18-38.3.1.x86_64",
"product": {
"name": "kernel-azure-5.3.18-38.3.1.x86_64",
"product_id": "kernel-azure-5.3.18-38.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-5.3.18-38.3.1.x86_64",
"product": {
"name": "kernel-azure-devel-5.3.18-38.3.1.x86_64",
"product_id": "kernel-azure-devel-5.3.18-38.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-5.3.18-38.3.1.x86_64",
"product": {
"name": "kernel-azure-extra-5.3.18-38.3.1.x86_64",
"product_id": "kernel-azure-extra-5.3.18-38.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"product": {
"name": "kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"product_id": "kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-optional-5.3.18-38.3.1.x86_64",
"product": {
"name": "kernel-azure-optional-5.3.18-38.3.1.x86_64",
"product_id": "kernel-azure-optional-5.3.18-38.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-azure-5.3.18-38.3.1.x86_64",
"product": {
"name": "kernel-syms-azure-5.3.18-38.3.1.x86_64",
"product_id": "kernel-syms-azure-5.3.18-38.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"product": {
"name": "kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"product_id": "kselftests-kmp-azure-5.3.18-38.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"product": {
"name": "ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"product_id": "ocfs2-kmp-azure-5.3.18-38.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-azure-5.3.18-38.3.1.x86_64",
"product": {
"name": "reiserfs-kmp-azure-5.3.18-38.3.1.x86_64",
"product_id": "reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-azure-5.3.18-38.3.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64"
},
"product_reference": "cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-azure-5.3.18-38.3.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64"
},
"product_reference": "dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-azure-5.3.18-38.3.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64"
},
"product_reference": "gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-5.3.18-38.3.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64"
},
"product_reference": "kernel-azure-5.3.18-38.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-5.3.18-38.3.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64"
},
"product_reference": "kernel-azure-devel-5.3.18-38.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-extra-5.3.18-38.3.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64"
},
"product_reference": "kernel-azure-extra-5.3.18-38.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64"
},
"product_reference": "kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-optional-5.3.18-38.3.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64"
},
"product_reference": "kernel-azure-optional-5.3.18-38.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-5.3.18-38.3.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch"
},
"product_reference": "kernel-devel-azure-5.3.18-38.3.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-5.3.18-38.3.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch"
},
"product_reference": "kernel-source-azure-5.3.18-38.3.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-5.3.18-38.3.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
},
"product_reference": "kernel-syms-azure-5.3.18-38.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-azure-5.3.18-38.3.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64"
},
"product_reference": "kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-azure-5.3.18-38.3.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64"
},
"product_reference": "ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-azure-5.3.18-38.3.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
},
"product_reference": "reiserfs-kmp-azure-5.3.18-38.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-18814",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18814"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.3.9. There is a use-after-free when aa_label_parse() fails in aa_audit_rule_init() in security/apparmor/audit.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18814",
"url": "https://www.suse.com/security/cve/CVE-2019-18814"
},
{
"category": "external",
"summary": "SUSE Bug 1156256 for CVE-2019-18814",
"url": "https://bugzilla.suse.com/1156256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "moderate"
}
],
"title": "CVE-2019-18814"
},
{
"cve": "CVE-2019-19769",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19769"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel 5.3.10, there is a use-after-free (read) in the perf_trace_lock_acquire function (related to include/trace/events/lock.h).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19769",
"url": "https://www.suse.com/security/cve/CVE-2019-19769"
},
{
"category": "external",
"summary": "SUSE Bug 1159280 for CVE-2019-19769",
"url": "https://bugzilla.suse.com/1159280"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "moderate"
}
],
"title": "CVE-2019-19769"
},
{
"cve": "CVE-2020-24586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24586"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24586",
"url": "https://www.suse.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "moderate"
}
],
"title": "CVE-2020-24586"
},
{
"cve": "CVE-2020-24587",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24587"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24587",
"url": "https://www.suse.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1185862 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "moderate"
}
],
"title": "CVE-2020-24587"
},
{
"cve": "CVE-2020-24588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24588"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24588",
"url": "https://www.suse.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "SUSE Bug 1185861 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1192868"
},
{
"category": "external",
"summary": "SUSE Bug 1199701 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1199701"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "moderate"
}
],
"title": "CVE-2020-24588"
},
{
"cve": "CVE-2020-25670",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25670"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel where refcount leak in llcp_sock_bind() causing use-after-free which might lead to privilege escalations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25670",
"url": "https://www.suse.com/security/cve/CVE-2020-25670"
},
{
"category": "external",
"summary": "SUSE Bug 1178181 for CVE-2020-25670",
"url": "https://bugzilla.suse.com/1178181"
},
{
"category": "external",
"summary": "SUSE Bug 1194680 for CVE-2020-25670",
"url": "https://bugzilla.suse.com/1194680"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "important"
}
],
"title": "CVE-2020-25670"
},
{
"cve": "CVE-2020-25671",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25671"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel, where a refcount leak in llcp_sock_connect() causing use-after-free which might lead to privilege escalations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25671",
"url": "https://www.suse.com/security/cve/CVE-2020-25671"
},
{
"category": "external",
"summary": "SUSE Bug 1178181 for CVE-2020-25671",
"url": "https://bugzilla.suse.com/1178181"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "important"
}
],
"title": "CVE-2020-25671"
},
{
"cve": "CVE-2020-25672",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25672"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak vulnerability was found in Linux kernel in llcp_sock_connect",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25672",
"url": "https://www.suse.com/security/cve/CVE-2020-25672"
},
{
"category": "external",
"summary": "SUSE Bug 1178181 for CVE-2020-25672",
"url": "https://bugzilla.suse.com/1178181"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "important"
}
],
"title": "CVE-2020-25672"
},
{
"cve": "CVE-2020-25673",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25673"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux kernel where non-blocking socket in llcp_sock_connect() leads to leak and eventually hanging-up the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25673",
"url": "https://www.suse.com/security/cve/CVE-2020-25673"
},
{
"category": "external",
"summary": "SUSE Bug 1178181 for CVE-2020-25673",
"url": "https://bugzilla.suse.com/1178181"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "important"
}
],
"title": "CVE-2020-25673"
},
{
"cve": "CVE-2020-26139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26139"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26139",
"url": "https://www.suse.com/security/cve/CVE-2020-26139"
},
{
"category": "external",
"summary": "SUSE Bug 1186062 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "moderate"
}
],
"title": "CVE-2020-26139"
},
{
"cve": "CVE-2020-26141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26141"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26141",
"url": "https://www.suse.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "SUSE Bug 1185987 for CVE-2020-26141",
"url": "https://bugzilla.suse.com/1185987"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "moderate"
}
],
"title": "CVE-2020-26141"
},
{
"cve": "CVE-2020-26145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26145"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26145",
"url": "https://www.suse.com/security/cve/CVE-2020-26145"
},
{
"category": "external",
"summary": "SUSE Bug 1185860 for CVE-2020-26145",
"url": "https://bugzilla.suse.com/1185860"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "moderate"
}
],
"title": "CVE-2020-26145"
},
{
"cve": "CVE-2020-26147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26147"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26147",
"url": "https://www.suse.com/security/cve/CVE-2020-26147"
},
{
"category": "external",
"summary": "SUSE Bug 1233723 for CVE-2020-26147",
"url": "https://bugzilla.suse.com/1233723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "moderate"
}
],
"title": "CVE-2020-26147"
},
{
"cve": "CVE-2020-27170",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-27170"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.11.8. kernel/bpf/verifier.c performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory, aka CID-f232326f6966. This affects pointer types that do not define a ptr_limit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-27170",
"url": "https://www.suse.com/security/cve/CVE-2020-27170"
},
{
"category": "external",
"summary": "SUSE Bug 1183686 for CVE-2020-27170",
"url": "https://bugzilla.suse.com/1183686"
},
{
"category": "external",
"summary": "SUSE Bug 1183775 for CVE-2020-27170",
"url": "https://bugzilla.suse.com/1183775"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "moderate"
}
],
"title": "CVE-2020-27170"
},
{
"cve": "CVE-2020-27171",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-27171"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.11.8. kernel/bpf/verifier.c has an off-by-one error (with a resultant integer underflow) affecting out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory, aka CID-10d2bb2e6b1d.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-27171",
"url": "https://www.suse.com/security/cve/CVE-2020-27171"
},
{
"category": "external",
"summary": "SUSE Bug 1183686 for CVE-2020-27171",
"url": "https://bugzilla.suse.com/1183686"
},
{
"category": "external",
"summary": "SUSE Bug 1183775 for CVE-2020-27171",
"url": "https://bugzilla.suse.com/1183775"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "moderate"
}
],
"title": "CVE-2020-27171"
},
{
"cve": "CVE-2020-27673",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-27673"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. Guest OS users can cause a denial of service (host OS hang) via a high rate of events to dom0, aka CID-e99502f76271.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-27673",
"url": "https://www.suse.com/security/cve/CVE-2020-27673"
},
{
"category": "external",
"summary": "SUSE Bug 1177411 for CVE-2020-27673",
"url": "https://bugzilla.suse.com/1177411"
},
{
"category": "external",
"summary": "SUSE Bug 1184583 for CVE-2020-27673",
"url": "https://bugzilla.suse.com/1184583"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "moderate"
}
],
"title": "CVE-2020-27673"
},
{
"cve": "CVE-2020-27815",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-27815"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the JFS filesystem code in the Linux Kernel which allows a local attacker with the ability to set extended attributes to panic the system, causing memory corruption or escalating privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-27815",
"url": "https://www.suse.com/security/cve/CVE-2020-27815"
},
{
"category": "external",
"summary": "SUSE Bug 1179454 for CVE-2020-27815",
"url": "https://bugzilla.suse.com/1179454"
},
{
"category": "external",
"summary": "SUSE Bug 1179458 for CVE-2020-27815",
"url": "https://bugzilla.suse.com/1179458"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "important"
}
],
"title": "CVE-2020-27815"
},
{
"cve": "CVE-2020-35519",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-35519"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds (OOB) memory access flaw was found in x25_bind in net/x25/af_x25.c in the Linux kernel version v5.12-rc5. A bounds check failure allows a local attacker with a user account on the system to gain access to out-of-bounds memory, leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-35519",
"url": "https://www.suse.com/security/cve/CVE-2020-35519"
},
{
"category": "external",
"summary": "SUSE Bug 1183696 for CVE-2020-35519",
"url": "https://bugzilla.suse.com/1183696"
},
{
"category": "external",
"summary": "SUSE Bug 1184953 for CVE-2020-35519",
"url": "https://bugzilla.suse.com/1184953"
},
{
"category": "external",
"summary": "SUSE Bug 1211495 for CVE-2020-35519",
"url": "https://bugzilla.suse.com/1211495"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "important"
}
],
"title": "CVE-2020-35519"
},
{
"cve": "CVE-2020-36310",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36310"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.8. arch/x86/kvm/svm/svm.c allows a set_memory_region_test infinite loop for certain nested page faults, aka CID-e72436bc3a52.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36310",
"url": "https://www.suse.com/security/cve/CVE-2020-36310"
},
{
"category": "external",
"summary": "SUSE Bug 1184512 for CVE-2020-36310",
"url": "https://bugzilla.suse.com/1184512"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "moderate"
}
],
"title": "CVE-2020-36310"
},
{
"cve": "CVE-2020-36311",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36311"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.9. arch/x86/kvm/svm/sev.c allows attackers to cause a denial of service (soft lockup) by triggering destruction of a large SEV VM (which requires unregistering many encrypted regions), aka CID-7be74942f184.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36311",
"url": "https://www.suse.com/security/cve/CVE-2020-36311"
},
{
"category": "external",
"summary": "SUSE Bug 1184511 for CVE-2020-36311",
"url": "https://bugzilla.suse.com/1184511"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "moderate"
}
],
"title": "CVE-2020-36311"
},
{
"cve": "CVE-2020-36312",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36312"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.8.10. virt/kvm/kvm_main.c has a kvm_io_bus_unregister_dev memory leak upon a kmalloc failure, aka CID-f65886606c2d.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36312",
"url": "https://www.suse.com/security/cve/CVE-2020-36312"
},
{
"category": "external",
"summary": "SUSE Bug 1184509 for CVE-2020-36312",
"url": "https://bugzilla.suse.com/1184509"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "low"
}
],
"title": "CVE-2020-36312"
},
{
"cve": "CVE-2020-36322",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36322"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the FUSE filesystem implementation in the Linux kernel before 5.10.6, aka CID-5d069dbe8aaf. fuse_do_getattr() calls make_bad_inode() in inappropriate situations, causing a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36322",
"url": "https://www.suse.com/security/cve/CVE-2020-36322"
},
{
"category": "external",
"summary": "SUSE Bug 1184211 for CVE-2020-36322",
"url": "https://bugzilla.suse.com/1184211"
},
{
"category": "external",
"summary": "SUSE Bug 1184952 for CVE-2020-36322",
"url": "https://bugzilla.suse.com/1184952"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-36322",
"url": "https://bugzilla.suse.com/1189302"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "important"
}
],
"title": "CVE-2020-36322"
},
{
"cve": "CVE-2021-20268",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20268"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds access flaw was found in the Linux kernel\u0027s implementation of the eBPF code verifier in the way a user running the eBPF script calls dev_map_init_map or sock_map_alloc. This flaw allows a local user to crash the system or possibly escalate their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20268",
"url": "https://www.suse.com/security/cve/CVE-2021-20268"
},
{
"category": "external",
"summary": "SUSE Bug 1183077 for CVE-2021-20268",
"url": "https://bugzilla.suse.com/1183077"
},
{
"category": "external",
"summary": "SUSE Bug 1183095 for CVE-2021-20268",
"url": "https://bugzilla.suse.com/1183095"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "important"
}
],
"title": "CVE-2021-20268"
},
{
"cve": "CVE-2021-23134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23134"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23134",
"url": "https://www.suse.com/security/cve/CVE-2021-23134"
},
{
"category": "external",
"summary": "SUSE Bug 1186060 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "external",
"summary": "SUSE Bug 1186061 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "external",
"summary": "SUSE Bug 1220739 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1220739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "important"
}
],
"title": "CVE-2021-23134"
},
{
"cve": "CVE-2021-27363",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-27363"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.3. A kernel pointer leak can be used to determine the address of the iscsi_transport structure. When an iSCSI transport is registered with the iSCSI subsystem, the transport\u0027s handle is available to unprivileged users via the sysfs file system, at /sys/class/iscsi_transport/$TRANSPORT_NAME/handle. When read, the show_transport_handle function (in drivers/scsi/scsi_transport_iscsi.c) is called, which leaks the handle. This handle is actually the pointer to an iscsi_transport struct in the kernel module\u0027s global variables.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-27363",
"url": "https://www.suse.com/security/cve/CVE-2021-27363"
},
{
"category": "external",
"summary": "SUSE Bug 1182716 for CVE-2021-27363",
"url": "https://bugzilla.suse.com/1182716"
},
{
"category": "external",
"summary": "SUSE Bug 1182717 for CVE-2021-27363",
"url": "https://bugzilla.suse.com/1182717"
},
{
"category": "external",
"summary": "SUSE Bug 1183120 for CVE-2021-27363",
"url": "https://bugzilla.suse.com/1183120"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-27363",
"url": "https://bugzilla.suse.com/1200084"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "important"
}
],
"title": "CVE-2021-27363"
},
{
"cve": "CVE-2021-27364",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-27364"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.3. drivers/scsi/scsi_transport_iscsi.c is adversely affected by the ability of an unprivileged user to craft Netlink messages.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-27364",
"url": "https://www.suse.com/security/cve/CVE-2021-27364"
},
{
"category": "external",
"summary": "SUSE Bug 1182715 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1182715"
},
{
"category": "external",
"summary": "SUSE Bug 1182716 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1182716"
},
{
"category": "external",
"summary": "SUSE Bug 1182717 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1182717"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "important"
}
],
"title": "CVE-2021-27364"
},
{
"cve": "CVE-2021-27365",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-27365"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.3. Certain iSCSI data structures do not have appropriate length constraints or checks, and can exceed the PAGE_SIZE value. An unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-27365",
"url": "https://www.suse.com/security/cve/CVE-2021-27365"
},
{
"category": "external",
"summary": "SUSE Bug 1182712 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1182712"
},
{
"category": "external",
"summary": "SUSE Bug 1182715 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1182715"
},
{
"category": "external",
"summary": "SUSE Bug 1183491 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1183491"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "important"
}
],
"title": "CVE-2021-27365"
},
{
"cve": "CVE-2021-28038",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28038"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.3, as used with Xen PV. A certain part of the netback driver lacks necessary treatment of errors such as failed memory allocations (as a result of changes to the handling of grant mapping errors). A host OS denial of service may occur during misbehavior of a networking frontend driver. NOTE: this issue exists because of an incomplete fix for CVE-2021-26931.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28038",
"url": "https://www.suse.com/security/cve/CVE-2021-28038"
},
{
"category": "external",
"summary": "SUSE Bug 1183022 for CVE-2021-28038",
"url": "https://bugzilla.suse.com/1183022"
},
{
"category": "external",
"summary": "SUSE Bug 1183069 for CVE-2021-28038",
"url": "https://bugzilla.suse.com/1183069"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "moderate"
}
],
"title": "CVE-2021-28038"
},
{
"cve": "CVE-2021-28375",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28375"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.6. fastrpc_internal_invoke in drivers/misc/fastrpc.c does not prevent user applications from sending kernel RPC messages, aka CID-20c40794eb85. This is a related issue to CVE-2019-2308.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28375",
"url": "https://www.suse.com/security/cve/CVE-2021-28375"
},
{
"category": "external",
"summary": "SUSE Bug 1183596 for CVE-2021-28375",
"url": "https://bugzilla.suse.com/1183596"
},
{
"category": "external",
"summary": "SUSE Bug 1184955 for CVE-2021-28375",
"url": "https://bugzilla.suse.com/1184955"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "important"
}
],
"title": "CVE-2021-28375"
},
{
"cve": "CVE-2021-28660",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28660"
}
],
"notes": [
{
"category": "general",
"text": "rtw_wx_set_scan in drivers/staging/rtl8188eu/os_dep/ioctl_linux.c in the Linux kernel through 5.11.6 allows writing beyond the end of the -\u003essid[] array. NOTE: from the perspective of kernel.org releases, CVE IDs are not normally used for drivers/staging/* (unfinished work); however, system integrators may have situations in which a drivers/staging issue is relevant to their own customer base.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28660",
"url": "https://www.suse.com/security/cve/CVE-2021-28660"
},
{
"category": "external",
"summary": "SUSE Bug 1183593 for CVE-2021-28660",
"url": "https://bugzilla.suse.com/1183593"
},
{
"category": "external",
"summary": "SUSE Bug 1183658 for CVE-2021-28660",
"url": "https://bugzilla.suse.com/1183658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "important"
}
],
"title": "CVE-2021-28660"
},
{
"cve": "CVE-2021-28688",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28688"
}
],
"notes": [
{
"category": "general",
"text": "The fix for XSA-365 includes initialization of pointers such that subsequent cleanup code wouldn\u0027t use uninitialized or stale values. This initialization went too far and may under certain conditions also overwrite pointers which are in need of cleaning up. The lack of cleanup would result in leaking persistent grants. The leak in turn would prevent fully cleaning up after a respective guest has died, leaving around zombie domains. All Linux versions having the fix for XSA-365 applied are vulnerable. XSA-365 was classified to affect versions back to at least 3.11.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28688",
"url": "https://www.suse.com/security/cve/CVE-2021-28688"
},
{
"category": "external",
"summary": "SUSE Bug 1183646 for CVE-2021-28688",
"url": "https://bugzilla.suse.com/1183646"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "moderate"
}
],
"title": "CVE-2021-28688"
},
{
"cve": "CVE-2021-28950",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28950"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in fs/fuse/fuse_i.h in the Linux kernel before 5.11.8. A \"stall on CPU\" can occur because a retry loop continually finds the same bad inode, aka CID-775c5033a0d1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28950",
"url": "https://www.suse.com/security/cve/CVE-2021-28950"
},
{
"category": "external",
"summary": "SUSE Bug 1184194 for CVE-2021-28950",
"url": "https://bugzilla.suse.com/1184194"
},
{
"category": "external",
"summary": "SUSE Bug 1184211 for CVE-2021-28950",
"url": "https://bugzilla.suse.com/1184211"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "moderate"
}
],
"title": "CVE-2021-28950"
},
{
"cve": "CVE-2021-28952",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28952"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.8. The sound/soc/qcom/sdm845.c soundwire device driver has a buffer overflow when an unexpected port ID number is encountered, aka CID-1c668e1c0a0f. (This has been fixed in 5.12-rc4.)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28952",
"url": "https://www.suse.com/security/cve/CVE-2021-28952"
},
{
"category": "external",
"summary": "SUSE Bug 1184197 for CVE-2021-28952",
"url": "https://bugzilla.suse.com/1184197"
},
{
"category": "external",
"summary": "SUSE Bug 1184199 for CVE-2021-28952",
"url": "https://bugzilla.suse.com/1184199"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "important"
}
],
"title": "CVE-2021-28952"
},
{
"cve": "CVE-2021-28964",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28964"
}
],
"notes": [
{
"category": "general",
"text": "A race condition was discovered in get_old_root in fs/btrfs/ctree.c in the Linux kernel through 5.11.8. It allows attackers to cause a denial of service (BUG) because of a lack of locking on an extent buffer before a cloning operation, aka CID-dbcc7d57bffc.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28964",
"url": "https://www.suse.com/security/cve/CVE-2021-28964"
},
{
"category": "external",
"summary": "SUSE Bug 1184193 for CVE-2021-28964",
"url": "https://bugzilla.suse.com/1184193"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "moderate"
}
],
"title": "CVE-2021-28964"
},
{
"cve": "CVE-2021-28971",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28971"
}
],
"notes": [
{
"category": "general",
"text": "In intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c in the Linux kernel through 5.11.8 on some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled, aka CID-d88d05a9e0b6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28971",
"url": "https://www.suse.com/security/cve/CVE-2021-28971"
},
{
"category": "external",
"summary": "SUSE Bug 1184196 for CVE-2021-28971",
"url": "https://bugzilla.suse.com/1184196"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "moderate"
}
],
"title": "CVE-2021-28971"
},
{
"cve": "CVE-2021-28972",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28972"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/pci/hotplug/rpadlpar_sysfs.c in the Linux kernel through 5.11.8, the RPA PCI Hotplug driver has a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly. This occurs because add_slot_store and remove_slot_store mishandle drc_name \u0027\\0\u0027 termination, aka CID-cc7a0bb058b8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28972",
"url": "https://www.suse.com/security/cve/CVE-2021-28972"
},
{
"category": "external",
"summary": "SUSE Bug 1184198 for CVE-2021-28972",
"url": "https://bugzilla.suse.com/1184198"
},
{
"category": "external",
"summary": "SUSE Bug 1220060 for CVE-2021-28972",
"url": "https://bugzilla.suse.com/1220060"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "moderate"
}
],
"title": "CVE-2021-28972"
},
{
"cve": "CVE-2021-29154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-29154"
}
],
"notes": [
{
"category": "general",
"text": "BPF JIT compilers in the Linux kernel through 5.11.12 have incorrect computation of branch displacements, allowing them to execute arbitrary code within the kernel context. This affects arch/x86/net/bpf_jit_comp.c and arch/x86/net/bpf_jit_comp32.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-29154",
"url": "https://www.suse.com/security/cve/CVE-2021-29154"
},
{
"category": "external",
"summary": "SUSE Bug 1184391 for CVE-2021-29154",
"url": "https://bugzilla.suse.com/1184391"
},
{
"category": "external",
"summary": "SUSE Bug 1184710 for CVE-2021-29154",
"url": "https://bugzilla.suse.com/1184710"
},
{
"category": "external",
"summary": "SUSE Bug 1186408 for CVE-2021-29154",
"url": "https://bugzilla.suse.com/1186408"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "important"
}
],
"title": "CVE-2021-29154"
},
{
"cve": "CVE-2021-29155",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-29155"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.x. kernel/bpf/verifier.c performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory. Specifically, for sequences of pointer arithmetic operations, the pointer modification performed by the first operation is not correctly accounted for when restricting subsequent operations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-29155",
"url": "https://www.suse.com/security/cve/CVE-2021-29155"
},
{
"category": "external",
"summary": "SUSE Bug 1184942 for CVE-2021-29155",
"url": "https://bugzilla.suse.com/1184942"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "moderate"
}
],
"title": "CVE-2021-29155"
},
{
"cve": "CVE-2021-29264",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-29264"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.10. drivers/net/ethernet/freescale/gianfar.c in the Freescale Gianfar Ethernet driver allows attackers to cause a system crash because a negative fragment size is calculated in situations involving an rx queue overrun when jumbo packets are used and NAPI is enabled, aka CID-d8861bab48b6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-29264",
"url": "https://www.suse.com/security/cve/CVE-2021-29264"
},
{
"category": "external",
"summary": "SUSE Bug 1184168 for CVE-2021-29264",
"url": "https://bugzilla.suse.com/1184168"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "moderate"
}
],
"title": "CVE-2021-29264"
},
{
"cve": "CVE-2021-29265",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-29265"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.11.7. usbip_sockfd_store in drivers/usb/usbip/stub_dev.c allows attackers to cause a denial of service (GPF) because the stub-up sequence has race conditions during an update of the local and shared status, aka CID-9380afd6df70.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-29265",
"url": "https://www.suse.com/security/cve/CVE-2021-29265"
},
{
"category": "external",
"summary": "SUSE Bug 1184167 for CVE-2021-29265",
"url": "https://bugzilla.suse.com/1184167"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "moderate"
}
],
"title": "CVE-2021-29265"
},
{
"cve": "CVE-2021-29647",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-29647"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.11.11. qrtr_recvmsg in net/qrtr/qrtr.c allows attackers to obtain sensitive information from kernel memory because of a partially uninitialized data structure, aka CID-50535249f624.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-29647",
"url": "https://www.suse.com/security/cve/CVE-2021-29647"
},
{
"category": "external",
"summary": "SUSE Bug 1184192 for CVE-2021-29647",
"url": "https://bugzilla.suse.com/1184192"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "moderate"
}
],
"title": "CVE-2021-29647"
},
{
"cve": "CVE-2021-29650",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-29650"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.11.11. The netfilter subsystem allows attackers to cause a denial of service (panic) because net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h lack a full memory barrier upon the assignment of a new table value, aka CID-175e476b8cdf.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-29650",
"url": "https://www.suse.com/security/cve/CVE-2021-29650"
},
{
"category": "external",
"summary": "SUSE Bug 1184208 for CVE-2021-29650",
"url": "https://bugzilla.suse.com/1184208"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "moderate"
}
],
"title": "CVE-2021-29650"
},
{
"cve": "CVE-2021-30002",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30002"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.11.3 when a webcam device exists. video_usercopy in drivers/media/v4l2-core/v4l2-ioctl.c has a memory leak for large arguments, aka CID-fb18802a338b.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30002",
"url": "https://www.suse.com/security/cve/CVE-2021-30002"
},
{
"category": "external",
"summary": "SUSE Bug 1184120 for CVE-2021-30002",
"url": "https://bugzilla.suse.com/1184120"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "moderate"
}
],
"title": "CVE-2021-30002"
},
{
"cve": "CVE-2021-32399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32399"
}
],
"notes": [
{
"category": "general",
"text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32399",
"url": "https://www.suse.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "SUSE Bug 1184611 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "external",
"summary": "SUSE Bug 1185898 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "external",
"summary": "SUSE Bug 1185899 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "important"
}
],
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-33034",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33034"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33034",
"url": "https://www.suse.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "SUSE Bug 1186111 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "external",
"summary": "SUSE Bug 1186285 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "important"
}
],
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-33200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33200"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-\u003ealu_limit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33200",
"url": "https://www.suse.com/security/cve/CVE-2021-33200"
},
{
"category": "external",
"summary": "SUSE Bug 1186484 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "external",
"summary": "SUSE Bug 1186498 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "important"
}
],
"title": "CVE-2021-33200"
},
{
"cve": "CVE-2021-3428",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3428"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel. A denial of service problem is identified if an extent tree is corrupted in a crafted ext4 filesystem in fs/ext4/extents.c in ext4_es_cache_extent. Fabricating an integer overflow, A local attacker with a special user privilege may cause a system crash problem which can lead to an availability threat.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3428",
"url": "https://www.suse.com/security/cve/CVE-2021-3428"
},
{
"category": "external",
"summary": "SUSE Bug 1173485 for CVE-2021-3428",
"url": "https://bugzilla.suse.com/1173485"
},
{
"category": "external",
"summary": "SUSE Bug 1183509 for CVE-2021-3428",
"url": "https://bugzilla.suse.com/1183509"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "moderate"
}
],
"title": "CVE-2021-3428"
},
{
"cve": "CVE-2021-3444",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3444"
}
],
"notes": [
{
"category": "general",
"text": "The bpf verifier in the Linux kernel did not properly handle mod32 destination register truncation when the source register was known to be 0. A local attacker with the ability to load bpf programs could use this gain out-of-bounds reads in kernel memory leading to information disclosure (kernel memory), and possibly out-of-bounds writes that could potentially lead to code execution. This issue was addressed in the upstream kernel in commit 9b00f1b78809 (\"bpf: Fix truncation handling for mod32 dst reg wrt zero\") and in Linux stable kernels 5.11.2, 5.10.19, and 5.4.101.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3444",
"url": "https://www.suse.com/security/cve/CVE-2021-3444"
},
{
"category": "external",
"summary": "SUSE Bug 1184170 for CVE-2021-3444",
"url": "https://bugzilla.suse.com/1184170"
},
{
"category": "external",
"summary": "SUSE Bug 1184171 for CVE-2021-3444",
"url": "https://bugzilla.suse.com/1184171"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "important"
}
],
"title": "CVE-2021-3444"
},
{
"cve": "CVE-2021-3483",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3483"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Nosy driver in the Linux kernel. This issue allows a device to be inserted twice into a doubly-linked list, leading to a use-after-free when one of these devices is removed. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. Versions before kernel 5.12-rc6 are affected",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3483",
"url": "https://www.suse.com/security/cve/CVE-2021-3483"
},
{
"category": "external",
"summary": "SUSE Bug 1184393 for CVE-2021-3483",
"url": "https://bugzilla.suse.com/1184393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "moderate"
}
],
"title": "CVE-2021-3483"
},
{
"cve": "CVE-2021-3489",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3489"
}
],
"notes": [
{
"category": "general",
"text": "The eBPF RINGBUF bpf_ringbuf_reserve() function in the Linux kernel did not check that the allocated size was smaller than the ringbuf size, allowing an attacker to perform out-of-bounds writes within the kernel and therefore, arbitrary code execution. This issue was fixed via commit 4b81ccebaeee (\"bpf, ringbuf: Deny reserve of buffers larger than ringbuf\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced via 457f44363a88 (\"bpf: Implement BPF ring buffer and verifier support for it\") (v5.8-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3489",
"url": "https://www.suse.com/security/cve/CVE-2021-3489"
},
{
"category": "external",
"summary": "SUSE Bug 1185640 for CVE-2021-3489",
"url": "https://bugzilla.suse.com/1185640"
},
{
"category": "external",
"summary": "SUSE Bug 1185856 for CVE-2021-3489",
"url": "https://bugzilla.suse.com/1185856"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "important"
}
],
"title": "CVE-2021-3489"
},
{
"cve": "CVE-2021-3490",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3490"
}
],
"notes": [
{
"category": "general",
"text": "The eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) in the Linux kernel did not properly update 32-bit bounds, which could be turned into out of bounds reads and writes in the Linux kernel and therefore, arbitrary code execution. This issue was fixed via commit 049c4e13714e (\"bpf: Fix alu32 const subreg bound tracking on bitwise operations\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. The AND/OR issues were introduced by commit 3f50f132d840 (\"bpf: Verifier, do explicit ALU32 bounds tracking\") (5.7-rc1) and the XOR variant was introduced by 2921c90d4718 (\"bpf:Fix a verifier failure with xor\") ( 5.10-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3490",
"url": "https://www.suse.com/security/cve/CVE-2021-3490"
},
{
"category": "external",
"summary": "SUSE Bug 1185641 for CVE-2021-3490",
"url": "https://bugzilla.suse.com/1185641"
},
{
"category": "external",
"summary": "SUSE Bug 1185796 for CVE-2021-3490",
"url": "https://bugzilla.suse.com/1185796"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "important"
}
],
"title": "CVE-2021-3490"
},
{
"cve": "CVE-2021-3491",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3491"
}
],
"notes": [
{
"category": "general",
"text": "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3491",
"url": "https://www.suse.com/security/cve/CVE-2021-3491"
},
{
"category": "external",
"summary": "SUSE Bug 1185642 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "external",
"summary": "SUSE Bug 1187090 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1187090"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "important"
}
],
"title": "CVE-2021-3491"
}
]
}
opensuse-su-2021:1977-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-33200: Enforcing incorrect limits for pointer arithmetic operations by the BPF verifier could be abused to perform out-of-bounds reads and writes in kernel memory (bsc#1186484).\n- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values. (bsc#1186111)\n- CVE-2020-26139: Fixed a denial-of-service when an Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. (bnc#1186062)\n- CVE-2021-23134: A Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges. (bnc#1186060)\n- CVE-2021-3491: Fixed a potential heap overflow in mem_rw(). This vulnerability is related to the PROVIDE_BUFFERS operation, which allowed the MAX_RW_COUNT limit to be bypassed (bsc#1185642).\n- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).\n- CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances this can be abused to inject arbitrary network packets and/or exfiltrate user data (bnc#1185859).\n- CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed (bnc#1185859 bnc#1185862).\n- CVE-2020-24588: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets. (bnc#1185861)\n- CVE-2020-26147: The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments, even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used (bnc#1185859).\n- CVE-2020-26145: An issue was discovered with Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration. (bnc#1185860)\n- CVE-2020-26141: An issue was discovered in the ALFA driver for AWUS036H, where the Message Integrity Check (authenticity) of fragmented TKIP frames was not verified. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bnc#1185987)\n- CVE-2021-29650: Fixed an issue with the netfilter subsystem that allowed attackers to cause a denial of service (panic) because net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h lack a full memory barrier upon the assignment of a new table value (bnc#1184208).\n- CVE-2021-29155: Fixed an issue that was discovered in kernel/bpf/verifier.c that performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory. Specifically, for sequences of pointer arithmetic operations, the pointer modification performed by the first operation was not correctly accounted for when restricting subsequent operations (bnc#1184942).\n- CVE-2021-3444: Fixed an issue with the bpf verifier which did not properly handle mod32 destination register truncation when the source register was known to be 0 leading to out of bounds read (bsc#1184170).\n- CVE-2021-3428: Fixed an integer overflow in ext4_es_cache_extent (bsc#1173485).\n- CVE-2021-29647: Fixed an issue in qrtr_recvmsg which could have allowed attackers to obtain sensitive information from kernel memory because of a partially uninitialized data structure (bsc#1184192 ).\n- CVE-2021-29265: Fixed an issue in usbip_sockfd_store which could have allowed attackers to cause a denial of service due to race conditions during an update of the local and shared status (bsc#1184167).\n- CVE-2021-29264: Fixed an issue in the Freescale Gianfar Ethernet driver which could have allowed attackers to cause a system crash due to a calculation of negative fragment size (bsc#1184168).\n- CVE-2021-28972: Fixed a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly (bsc#1184198).\n- CVE-2021-28971: Fixed an issue in intel_pmu_drain_pebs_nhm which could have caused a system crash because the PEBS status in a PEBS record was mishandled (bsc#1184196 ).\n- CVE-2021-28964: Fixed a race condition in get_old_root which could have allowed attackers to cause a denial of service (bsc#1184193).\n- CVE-2021-28688: Fixed an issue introduced by XSA-365 (bsc#1183646).\n- CVE-2021-28660: Fixed an out of bounds write in rtw_wx_set_scan (bsc#1183593 ).\n- CVE-2021-28375: Fixed an issue in fastrpc_internal_invoke which did not prevent user applications from sending kernel RPC messages (bsc#1183596).\n- CVE-2021-28038: Fixed an issue with the netback driver which was lacking necessary treatment of errors such as failed memory allocations (bsc#1183022).\n- CVE-2021-27365: Fixed an issue where an unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message (bsc#1182715).\n- CVE-2021-27364: Fixed an issue where an attacker could craft Netlink messages (bsc#1182717).\n- CVE-2021-27363: Fixed a kernel pointer leak which could have been used to determine the address of the iscsi_transport structure (bsc#1182716).\n- CVE-2020-35519: Fixed an out-of-bounds memory access was found in x25_bind (bsc#1183696).\n- CVE-2020-27815: Fixed an issue in JFS filesystem where could have allowed an attacker to execute code (bsc#1179454).\n- CVE-2020-27171: Fixed an off-by-one error affecting out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory (bsc#1183775).\n- CVE-2020-27170: Fixed potential side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory (bsc#1183686).\n- CVE-2019-19769: Fixed a use-after-free in the perf_trace_lock_acquire function (bsc#1159280 ).\n- CVE-2019-18814: Fixed a use-after-free when aa_label_parse() fails in aa_audit_rule_init() (bsc#1156256).\n- CVE-2021-3483: Fixed a use-after-free in nosy.c (bsc#1184393).\n- CVE-2021-30002: Fixed a memory leak for large arguments in video_usercopy (bsc#1184120).\n- CVE-2021-29154: Fixed incorrect computation of branch displacements, allowing arbitrary code execution (bsc#1184391).\n- CVE-2021-28950: Fixed an issue in fs/fuse/fuse_i.h due to a retry loop continually was finding the same bad inode (bsc#1184194).\n- CVE-2021-28952: Fixed a buffer overflow in the soundwire device driver, triggered when an unexpected port ID number is encountered. (bnc#1184197).\n- CVE-2021-20268: Fixed an out-of-bounds access flaw in the implementation of the eBPF code verifier. This flaw allowed a local user to crash the system or possibly escalate their privileges. (bnc#1183077)\n- CVE-2020-27673: Fixed a vulnerability with xen, where guest OS users could cause a denial of service (host OS hang) via a high rate of events to dom0 (bnc#1177411).\n- CVE-2020-36312: Fixed a memory leak upon a kmalloc failure (bsc#1184509 ).\n- CVE-2020-36311: Fixed a denial of service (soft lockup) by triggering destruction of a large SEV VM (bsc#1184511).\n- CVE-2020-36310: Fixed infinite loop for certain nested page faults (bsc#1184512).\n- CVE-2021-3489: Fixed an issue where the eBPF RINGBUF bpf_ringbuf_reserve did not check that the allocated size was smaller than the ringbuf size (bnc#1185640).\n- CVE-2021-3490: Fixed an issue where the eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) did not update the 32-bit bounds (bnc#1185641 bnc#1185796 ).\n- CVE-2020-36322: Fixed an issue was discovered in FUSE filesystem implementation which could have caused a system crash (bsc#1184211).\n- CVE-2020-25670, CVE-2020-25671, CVE-2020-25672, CVE-2020-25673: Fixed multiple bugs in NFC subsytem (bsc#1178181).\n\nThe following non-security bugs were fixed:\n\n- ACPI / hotplug / PCI: Fix reference count leak in enable_slot() (git-fixes).\n- ACPI / idle: override c-state latency when not in conformance with s0ix (bsc#1185840).\n- ACPI: CPPC: Replace cppc_attr with kobj_attribute (git-fixes).\n- ACPI: GTDT: Do not corrupt interrupt mappings on watchdow probe failure (git-fixes).\n- ACPI: PM: Add ACPI ID of Alder Lake Fan (git-fixes).\n- ACPI: PM: s2idle: Add AMD support to handle _DSM (bsc#1185840).\n- ACPI: PM: s2idle: Add missing LPS0 functions for AMD (bsc#1185840).\n- ACPI: PM: s2idle: Drop unused local variables and related code (bsc#1185840).\n- ACPI: PM: s2idle: Move x86-specific code to the x86 directory (bsc#1185840).\n- ACPI: custom_method: fix a possible memory leak (git-fixes).\n- ACPI: custom_method: fix potential use-after-free issue (git-fixes).\n- ACPI: processor: Fix CPU0 wakeup in acpi_idle_play_dead() (git-fixes).\n- ACPI: processor: Fix build when CONFIG_ACPI_PROCESSOR=m (git-fixes).\n- ACPI: scan: Rearrange memory allocation in acpi_device_add() (git-fixes).\n- ACPI: video: Add DMI quirk for GIGABYTE GB-BXBT-2807 (git-fixes).\n- ACPI: video: Add missing callback back for Sony VPCEH3U1E (git-fixes).\n- ACPICA: Always create namespace nodes using acpi_ns_create_node() (git-fixes).\n- ACPICA: Enable sleep button on ACPI legacy wake (bsc#1181383).\n- ACPICA: Fix race in generic_serial_bus (I2C) and GPIO op_region parameter handling (git-fixes).\n- ALSA: Convert strlcpy to strscpy when return value is unused (git-fixes).\n- ALSA: aloop: Fix initialization of controls (git-fixes).\n- ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro (git-fixes).\n- ALSA: bebob: enable to deliver MIDI messages for multiple ports (git-fixes).\n- ALSA: core: remove redundant spin_lock pair in snd_card_disconnect (git-fixes).\n- ALSA: dice: fix null pointer dereference when node is disconnected (git-fixes).\n- ALSA: dice: fix stream format at middle sampling rate for Alesis iO 26 (git-fixes).\n- ALSA: dice: fix stream format for TC Electronic Konnekt Live at high sampling transfer frequency (git-fixes).\n- ALSA: emu8000: Fix a use after free in snd_emu8000_create_mixer (git-fixes).\n- ALSA: firewire-lib: fix amdtp_packet tracepoints event for packet_index field (git-fixes).\n- ALSA: firewire-lib: fix calculation for size of IR context payload (git-fixes).\n- ALSA: firewire-lib: fix check for the size of isochronous packet payload (git-fixes).\n- ALSA: hda/ca0132: Add Sound BlasterX AE-5 Plus support (git-fixes).\n- ALSA: hda/cirrus: Add Headphone and Headset MIC Volume Control (git-fixes).\n- ALSA: hda/cirrus: Add error handling into CS8409 I2C functions (git-fixes).\n- ALSA: hda/cirrus: Add jack detect interrupt support from CS42L42 companion codec (git-fixes).\n- ALSA: hda/cirrus: Add support for CS8409 HDA bridge and CS42L42 companion codec (git-fixes).\n- ALSA: hda/cirrus: Cleanup patch_cirrus.c code (git-fixes).\n- ALSA: hda/cirrus: Fix CS42L42 Headset Mic volume control name (git-fixes).\n- ALSA: hda/cirrus: Make CS8409 driver more generic by using fixups (git-fixes).\n- ALSA: hda/cirrus: Set Initial DMIC volume for Bullseye to -26 dB (git-fixes).\n- ALSA: hda/cirrus: Use CS8409 filter to fix abnormal sounds on Bullseye (git-fixes).\n- ALSA: hda/conexant: Add quirk for mute LED control on HP ZBook G5 (git-fixes).\n- ALSA: hda/conexant: Apply quirk for another HP ZBook G5 model (git-fixes).\n- ALSA: hda/conexant: Re-order CX5066 quirk table entries (git-fixes).\n- ALSA: hda/conexant: Re-order CX5066 quirk table entries (git-fixes).\n- ALSA: hda/hdmi: Cancel pending works before suspend (bsc#1182377).\n- ALSA: hda/hdmi: Cancel pending works before suspend (git-fixes).\n- ALSA: hda/hdmi: fix race in handling acomp ELD notification at resume (git-fixes).\n- ALSA: hda/realtek - Headset Mic issue on HP platform (git-fixes).\n- ALSA: hda/realtek: ALC285 Thinkpad jack pin quirk is unreachable (git-fixes).\n- ALSA: hda/realtek: Add fixup for HP OMEN laptop (git-fixes).\n- ALSA: hda/realtek: Add fixup for HP Spectre x360 15-df0xxx (git-fixes).\n- ALSA: hda/realtek: Add quirk for Intel Clevo PCx0Dx (git-fixes).\n- ALSA: hda/realtek: Add quirk for Lenovo Ideapad S740 (git-fixes).\n- ALSA: hda/realtek: Add some CLOVE SSIDs of ALC293 (git-fixes).\n- ALSA: hda/realtek: Apply headset-mic quirks for Xiaomi Redmibook Air (git-fixes).\n- ALSA: hda/realtek: Chain in pop reduction fixup for ThinkStation P340 (git-fixes).\n- ALSA: hda/realtek: Enable mute/micmute LEDs and limit mic boost on EliteBook 845 G8 (git-fixes).\n- ALSA: hda/realtek: Fix silent headphone output on ASUS UX430UA (git-fixes).\n- ALSA: hda/realtek: Fix speaker amp on HP Envy AiO 32 (git-fixes).\n- ALSA: hda/realtek: Fix speaker amp setup on Acer Aspire E1 (git-fixes).\n- ALSA: hda/realtek: GA503 use same quirks as GA401 (git-fixes).\n- ALSA: hda/realtek: Headphone volume is controlled by Front mixer (git-fixes).\n- ALSA: hda/realtek: Re-order ALC269 ASUS quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC269 Acer quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC269 Dell quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC269 HP quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC269 Lenovo quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC269 Sony quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC662 quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC882 Acer quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC882 Clevo quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC882 Sony quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order remaining ALC269 quirk table entries (git-fixes).\n- ALSA: hda/realtek: Remove redundant entry for ALC861 Haier/Uniwill devices (git-fixes).\n- ALSA: hda/realtek: apply pin quirk for XiaomiNotebook Pro (git-fixes).\n- ALSA: hda/realtek: call alc_update_headset_mode() in hp_automute_hook (git-fixes).\n- ALSA: hda/realtek: fix a determine_headset_type issue for a Dell AIO (git-fixes).\n- ALSA: hda/realtek: fix mic boost on Intel NUC 8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs and speaker for HP Zbook Fury 15 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs and speaker for HP Zbook Fury 17 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs and speaker for HP Zbook G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP 440 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP 640 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP 840 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP 850 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP 855 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP ProBook 445 G7 (git-fixes).\n- ALSA: hda/realtek: fix static noise on ALC285 Lenovo laptops (git-fixes).\n- ALSA: hda/realtek: reset eapd coeff to default value for alc287 (git-fixes).\n- ALSA: hda/realtek: the bass speaker can\u0027t output sound on Yoga 9i (git-fixes).\n- ALSA: hda: Add missing sanity checks in PM prepare/complete callbacks (git-fixes).\n- ALSA: hda: Avoid spurious unsol event handling during S3/S4 (bsc#1182377).\n- ALSA: hda: Avoid spurious unsol event handling during S3/S4 (git-fixes).\n- ALSA: hda: Drop the BATCH workaround for AMD controllers (git-fixes).\n- ALSA: hda: Flush pending unsolicited events before suspend (bsc#1182377).\n- ALSA: hda: Re-add dropped snd_poewr_change_state() calls (git-fixes).\n- ALSA: hda: fixup headset for ASUS GU502 laptop (git-fixes).\n- ALSA: hda: fixup headset for ASUS GU502 laptop (git-fixes).\n- ALSA: hda: generic: Fix the micmute led init state (git-fixes).\n- ALSA: hda: generic: change the DAC ctl name for LO+SPK or LO+HP (git-fixes).\n- ALSA: hda: ignore invalid NHLT table (git-fixes).\n- ALSA: hdsp: do not disable if not enabled (git-fixes).\n- ALSA: hdspm: do not disable if not enabled (git-fixes).\n- ALSA: intel8x0: Do not update period unless prepared (git-fixes).\n- ALSA: line6: Fix racy initialization of LINE6 MIDI (git-fixes).\n- ALSA: rme9652: do not disable if not enabled (git-fixes).\n- ALSA: sb: Fix two use after free in snd_sb_qsound_build (git-fixes).\n- ALSA: usb-audio: Add DJM-450 to the quirks table (git-fixes).\n- ALSA: usb-audio: Add DJM450 to Pioneer format quirk (git-fixes).\n- ALSA: usb-audio: Add DJM450 to Pioneer format quirk (git-fixes).\n- ALSA: usb-audio: Add DJM750 to Pioneer mixer quirk (git-fixes).\n- ALSA: usb-audio: Add MIDI quirk for Vox ToneLab EX (git-fixes).\n- ALSA: usb-audio: Add Pioneer DJM-850 to quirks-table (git-fixes).\n- ALSA: usb-audio: Add dB range mapping for Sennheiser Communications Headset PC 8 (git-fixes).\n- ALSA: usb-audio: Add error checks for usb_driver_claim_interface() calls (git-fixes).\n- ALSA: usb-audio: Add implicit feeback support for the BOSS GT-1 (git-fixes).\n- ALSA: usb-audio: Add support for Pioneer DJM-750 (git-fixes).\n- ALSA: usb-audio: Add support for many Roland devices\u0027 implicit feedback quirks (git-fixes).\n- ALSA: usb-audio: Apply implicit feedback mode for BOSS devices (git-fixes).\n- ALSA: usb-audio: Apply sample rate quirk to Logitech Connect (git-fixes).\n- ALSA: usb-audio: Carve out connector value checking into a helper (git-fixes).\n- ALSA: usb-audio: Check connector value on resume (git-fixes).\n- ALSA: usb-audio: Configure Pioneer DJM-850 samplerate (git-fixes).\n- ALSA: usb-audio: Convert remaining strlcpy() to strscpy() (git-fixes).\n- ALSA: usb-audio: Convert the last strlcpy() usage (git-fixes).\n- ALSA: usb-audio: DJM-750: ensure format is set (git-fixes).\n- ALSA: usb-audio: Declare Pioneer DJM-850 mixer controls (git-fixes).\n- ALSA: usb-audio: Drop implicit fb quirk entries dubbed for capture (git-fixes).\n- ALSA: usb-audio: Explicitly set up the clock selector (git-fixes).\n- ALSA: usb-audio: Fix \u0027RANGE setting not yet supported\u0027 errors (git-fixes).\n- ALSA: usb-audio: Fix Pioneer DJM devices URB_CONTROL request direction to set samplerate (git-fixes).\n- ALSA: usb-audio: Fix Pioneer DJM devices URB_CONTROL request direction to set samplerate (git-fixes).\n- ALSA: usb-audio: Fix implicit sync clearance at stopping stream (git-fixes).\n- ALSA: usb-audio: Fix potential out-of-bounce access in MIDI EP parser (git-fixes).\n- ALSA: usb-audio: Fix unintentional sign extension issue (git-fixes).\n- ALSA: usb-audio: Generic application of implicit fb to Roland/BOSS devices (git-fixes).\n- ALSA: usb-audio: Re-apply implicit feedback mode to Pioneer devices (git-fixes).\n- ALSA: usb-audio: Remove redundant assignment to len (git-fixes).\n- ALSA: usb-audio: Skip probe of UA-101 devices (git-fixes).\n- ALSA: usb-audio: Skip the clock selector inquiry for single connections (git-fixes).\n- ALSA: usb-audio: Validate MS endpoint descriptors (git-fixes).\n- ALSA: usb-audio: add mixer quirks for Pioneer DJM-900NXS2 (git-fixes).\n- ALSA: usb-audio: fix NULL ptr dereference in usb_audio_probe (bsc#1182552).\n- ALSA: usb-audio: fix Pioneer DJM-850 control label info (git-fixes).\n- ALSA: usb-audio: fix control-request direction (git-fixes).\n- ALSA: usb-audio: fix use after free in usb_audio_disconnect (bsc#1182552).\n- ALSA: usb-audio: generate midi streaming substream names from jack names (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix device hang with ehci-pci (git-fixes).\n- ALSA: usb-audio: scarlett2: Improve driver startup messages (git-fixes).\n- ALSA: usb-audio: scarlett2: snd_scarlett_gen2_controls_create() can be static (git-fixes).\n- ALSA: usb-audio: use usb headers rather than define structs locally (git-fixes).\n- ALSA: usb: Use DIV_ROUND_UP() instead of open-coding it (git-fixes).\n- ALSA: usb: midi: do not return -ENOMEM when usb_urb_ep_type_check fails (git-fixes).\n- ASoC: Intel: Add DMI quirk table to soc_intel_is_byt_cr() (git-fixes).\n- ASoC: Intel: boards: sof-wm8804: add check for PLL setting (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for ARCHOS Cesium 140 (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for the Acer One S1002 tablet (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for the Chuwi Hi8 tablet (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for the Estar Beauty HD MID 7316R tablet (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for the Voyo Winpad A15 tablet (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Enable jack-detect support on Asus T100TAF (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Fix HP Pavilion x2 10-p0XX OVCD current threshold (git-fixes).\n- ASoC: Intel: bytcr_rt5651: Add quirk for the Jumper EZpad 7 tablet (git-fixes).\n- ASoC: Intel: kbl_da7219_max98927: Fix kabylake_ssp_fixup function (git-fixes).\n- ASoC: Intel: sof_sdw: add quirk for HP Spectre x360 convertible (git-fixes).\n- ASoC: Intel: sof_sdw: add quirk for new ADL-P Rvp (git-fixes).\n- ASoC: Intel: sof_sdw: reorganize quirks by generation (git-fixes).\n- ASoC: SOF: Intel: HDA: fix core status verification (git-fixes).\n- ASoC: SOF: Intel: HDA: fix core status verification (git-fixes).\n- ASoC: SOF: Intel: hda: remove unnecessary parentheses (git-fixes).\n- ASoC: SOF: Intel: unregister DMIC device on probe error (git-fixes).\n- ASoC: SOF: intel: fix wrong poll bits in dsp power down (git-fixes).\n- ASoC: ak4458: Add MODULE_DEVICE_TABLE (git-fixes).\n- ASoC: ak5558: Add MODULE_DEVICE_TABLE (git-fixes).\n- ASoC: ak5558: Fix s/show/slow/ typo (git-fixes).\n- ASoC: ak5558: correct reset polarity (git-fixes).\n- ASoC: codecs: wcd934x: add a sanity check in set channel map (git-fixes).\n- ASoC: cs35l33: fix an error code in probe() (git-fixes).\n- ASoC: cs42l42: Always wait at least 3ms after reset (git-fixes).\n- ASoC: cs42l42: Do not enable/disable regulator at Bias Level (git-fixes).\n- ASoC: cs42l42: Fix Bitclock polarity inversion (git-fixes).\n- ASoC: cs42l42: Fix channel width support (git-fixes).\n- ASoC: cs42l42: Fix mixer volume control (git-fixes).\n- ASoC: cs42l42: Regmap must use_single_read/write (git-fixes).\n- ASoC: cygnus: fix for_each_child.cocci warnings (git-fixes).\n- ASoC: es8316: Simplify adc_pga_gain_tlv table (git-fixes).\n- ASoC: fsl_esai: Fix TDM slot setup for I2S mode (git-fixes).\n- ASoC: fsl_ssi: Fix TDM slot setup for I2S mode (git-fixes).\n- ASoC: intel: atom: Remove 44100 sample-rate from the media and deep-buffer DAI descriptions (git-fixes).\n- ASoC: intel: atom: Stop advertising non working S24LE support (git-fixes).\n- ASoC: max98373: Added 30ms turn on/off time delay (git-fixes).\n- ASoC: max98373: Changed amp shutdown register as volatile (git-fixes).\n- ASoC: qcom: lpass-cpu: Fix lpass dai ids parse (git-fixes).\n- ASoC: qcom: sdm845: Fix array out of bounds access (git-fixes).\n- ASoC: qcom: sdm845: Fix array out of range on rx slim channels (git-fixes).\n- ASoC: rsnd: call rsnd_ssi_master_clk_start() from rsnd_ssi_init() (git-fixes).\n- ASoC: rsnd: check all BUSIF status when error (git-fixes).\n- ASoC: rsnd: core: Check convert rate in rsnd_hw_params (git-fixes).\n- ASoC: rt1015: fix i2c communication error (git-fixes).\n- ASoC: rt286: Generalize support for ALC3263 codec (git-fixes).\n- ASoC: rt286: Make RT286_SET_GPIO_* readable and writable (git-fixes).\n- ASoC: rt5640: Fix dac- and adc- vol-tlv values being off by a factor of 10 (git-fixes).\n- ASoC: rt5651: Fix dac- and adc- vol-tlv values being off by a factor of 10 (git-fixes).\n- ASoC: rt5659: Update MCLK rate in set_sysclk() (git-fixes).\n- ASoC: rt5670: Add a quirk for the Dell Venue 10 Pro 5055 (git-fixes).\n- ASoC: rt5670: Add emulated \u0027DAC1 Playback Switch\u0027 control (git-fixes).\n- ASoC: rt5670: Remove \u0027HP Playback Switch\u0027 control (git-fixes).\n- ASoC: rt5670: Remove \u0027OUT Channel Switch\u0027 control (git-fixes).\n- ASoC: rt5670: Remove ADC vol-ctrl mute bits poking from Sto1 ADC mixer settings (git-fixes).\n- ASoC: rt711: add snd_soc_component remove callback (git-fixes).\n- ASoC: samsung: snow: remove useless test (git-fixes).\n- ASoC: samsung: tm2_wm5110: check of of_parse return value (git-fixes).\n- ASoC: sgtl5000: set DAP_AVC_CTRL register to correct default value on probe (git-fixes).\n- ASoC: simple-card-utils: Do not handle device clock (git-fixes).\n- ASoC: simple-card: fix possible uninitialized single_cpu local variable (git-fixes).\n- ASoC: soc-core kABI workaround (git-fixes).\n- ASoC: soc-core: Prevent warning if no DMI table is present (git-fixes).\n- ASoC: sunxi: sun4i-codec: fill ASoC card owner (git-fixes).\n- ASoC: wm8960: Fix wrong bclk and lrclk with pll enabled for some chips (git-fixes).\n- ASoC: wm8960: Remove bitclk relax condition in wm8960_configure_sysclk (git-fixes).\n- Bluetooth: Fix incorrect status handling in LE PHY UPDATE event (git-fixes).\n- Bluetooth: Fix null pointer dereference in amp_read_loc_assoc_final_data (git-fixes).\n- Bluetooth: L2CAP: Fix handling LE modes by L2CAP_OPTIONS (git-fixes).\n- Bluetooth: SMP: Fail if remote and local public keys are identical (git-fixes).\n- Bluetooth: Set CONF_NOT_COMPLETE as l2cap_chan default (git-fixes).\n- Bluetooth: avoid deadlock between hci_dev-\u003elock and socket lock (git-fixes).\n- Bluetooth: btqca: Add valid le states quirk (git-fixes).\n- Bluetooth: btusb: Enable quirk boolean flag for Mediatek Chip (git-fixes).\n- Bluetooth: check for zapped sk before connecting (git-fixes).\n- Bluetooth: hci_h5: Set HCI_QUIRK_SIMULTANEOUS_DISCOVERY for btrtl (git-fixes).\n- Bluetooth: initialize skb_queue_head at l2cap_chan_create() (git-fixes).\n- Drivers: hv: vmbus: Fix Suspend-to-Idle for Generation-2 VM (git-fixes).\n- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185725).\n- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185725).\n- Drivers: hv: vmbus: Use after free in __vmbus_open() (git-fixes).\n- EDAC/amd64: Check for memory before fully initializing an instance (bsc#1183815).\n- EDAC/amd64: Get rid of the ECC disabled long message (bsc#1183815).\n- EDAC/amd64: Use cached data when checking for ECC (bsc#1183815).\n- Goodix Fingerprint device is not a modem (git-fixes).\n- HID: alps: fix error return code in alps_input_configured() (git-fixes).\n- HID: google: add don USB id (git-fixes).\n- HID: i2c-hid: Add I2C_HID_QUIRK_NO_IRQ_AFTER_RESET for ITE8568 EC on Voyo Winpad A15 (git-fixes).\n- HID: mf: add support for 0079:1846 Mayflash/Dragonrise USB Gamecube Adapter (git-fixes).\n- HID: plantronics: Workaround for double volume key presses (git-fixes).\n- HID: wacom: Assign boolean values to a bool variable (git-fixes).\n- HID: wacom: set EV_KEY and EV_ABS only for non-HID_GENERIC type of devices (git-fixes).\n- HSI: Fix PM usage counter unbalance in ssi_hw_init (git-fixes).\n- IB/hfi1: Fix probe time panic when AIP is enabled with a buggy BIOS (jsc#SLE-13208).\n- IB/hfi1: Rework AIP and VNIC dummy netdev usage (jsc#SLE-13208).\n- Input: applespi - do not wait for responses to commands indefinitely (git-fixes).\n- Input: elantech - fix protocol errors for some trackpoints in SMBus mode (git-fixes).\n- Input: elants_i2c - do not bind to i2c-hid compatible ACPI instantiated devices (git-fixes).\n- Input: i8042 - fix Pegatron C15B ID entry (git-fixes).\n- Input: nspire-keypad - enable interrupts only when opened (git-fixes).\n- Input: s6sy761 - fix coordinate read bit shift (git-fixes).\n- Input: silead - add workaround for x86 BIOS-es which bring the chip up in a stuck state (git-fixes).\n- KEYS: trusted: Fix TPM reservation for seal/unseal (git-fixes).\n- KEYS: trusted: Fix memory leak on object td (git-fixes).\n- KVM x86: Extend AMD specific guest behavior to Hygon virtual CPUs (bsc#1183447).\n- KVM: PPC: Book3S HV P9: Restore host CTRL SPR after guest exit (bsc#1156395).\n- KVM: PPC: Make the VMX instruction emulation routines static (bsc#1156395).\n- KVM: SVM: Clear the CR4 register on reset (bsc#1183252).\n- KVM: kvmclock: Fix vCPUs \u003e 64 can\u0027t be online/hotpluged (bsc#1152489).\n- KVM: nVMX: Properly handle userspace interrupt window request (bsc#1183427).\n- KVM: s390: fix guarded storage control register handling (bsc#1133021).\n- KVM: x86: Add helpers to perform CPUID-based guest vendor check (bsc#1183445).\n- KVM: x86: Allow guests to see MSR_IA32_TSX_CTRL even if tsx=off (bsc#1183287).\n- KVM: x86: Allow guests to see MSR_IA32_TSX_CTRL even if tsx=off (bsc#1183323).\n- KVM: x86: Expose XSAVEERPTR to the guest (jsc#SLE-13573).\n- KVM: x86: Return -E2BIG when KVM_GET_SUPPORTED_CPUID hits max entries (bsc#1183428).\n- KVM: x86: Set so called \u0027reserved CR3 bits in LM mask\u0027 at vCPU reset (bsc#1183288).\n- KVM: x86: Set so called \u0027reserved CR3 bits in LM mask\u0027 at vCPU reset (bsc#1183324).\n- KVM: x86: do not reset microcode version on INIT or RESET (bsc#1183412).\n- KVM: x86: list MSR_IA32_UCODE_REV as an emulated MSR (bsc#1183369).\n- NFC: nci: fix memory leak in nci_allocate_device (git-fixes).\n- PCI/AER: Add RCEC AER error injection support (bsc#1174426).\n- PCI/AER: Add pcie_walk_rcec() to RCEC AER handling (bsc#1174426).\n- PCI/AER: Clear AER status from Root Port when resetting Downstream Port (bsc#1174426).\n- PCI/AER: Specify the type of Port that was reset (bsc#1174426).\n- PCI/AER: Use \u0027aer\u0027 variable for capability offset (bsc#1174426).\n- PCI/AER: Write AER Capability only when we control it (bsc#1174426).\n- PCI/ERR: Add pci_walk_bridge() to pcie_do_recovery() (bsc#1174426).\n- PCI/ERR: Add pcie_link_rcec() to associate RCiEPs (bsc#1174426).\n- PCI/ERR: Avoid negated conditional for clarity (bsc#1174426).\n- PCI/ERR: Bind RCEC devices to the Root Port driver (bsc#1174426).\n- PCI/ERR: Bind RCEC devices to the Root Port driver (jsc#SLE-13736 jsc#SLE-14845).\n- PCI/ERR: Cache RCEC EA Capability offset in pci_init_capabilities() (bsc#1174426).\n- PCI/ERR: Clear AER status only when we control AER (bsc#1174426).\n- PCI/ERR: Clear PCIe Device Status errors only if OS owns AER (bsc#1174426).\n- PCI/ERR: Clear status of the reporting device (bsc#1174426).\n- PCI/ERR: Recover from RCEC AER errors (bsc#1174426).\n- PCI/ERR: Recover from RCiEP AER errors (bsc#1174426).\n- PCI/ERR: Rename reset_link() to reset_subordinates() (bsc#1174426).\n- PCI/ERR: Retain status from error notification (bsc#1174426).\n- PCI/ERR: Simplify by computing pci_pcie_type() once (bsc#1174426).\n- PCI/ERR: Simplify by using pci_upstream_bridge() (bsc#1174426).\n- PCI/ERR: Use \u0027bridge\u0027 for clarity in pcie_do_recovery() (bsc#1174426).\n- PCI/PME: Add pcie_walk_rcec() to RCEC PME handling (bsc#1174426).\n- PCI/RCEC: Fix RCiEP device to RCEC association (git-fixes).\n- PCI/RCEC: Fix RCiEP device to RCEC association (jsc#SLE-13736 jsc#SLE-14845 git-fixes).\n- PCI/portdrv: Report reset for frozen channel (bsc#1174426).\n- PCI: Add a REBAR size quirk for Sapphire RX 5600 XT Pulse (git-fixes).\n- PCI: Add function 1 DMA alias quirk for Marvell 9215 SATA controller (git-fixes).\n- PCI: Allow VPD access for QLogic ISP2722 (git-fixes).\n- PCI: Fix pci_register_io_range() memory leak (git-fixes).\n- PCI: PM: Do not read power state in pci_enable_device_flags() (git-fixes).\n- PCI: Release OF node in pci_scan_device()\u0027s error path (git-fixes).\n- PCI: designware-ep: Fix the Header Type check (git-fixes).\n- PCI: dwc: Move iATU detection earlier (git-fixes).\n- PCI: endpoint: Fix missing destroy_workqueue() (git-fixes).\n- PCI: iproc: Fix return value of iproc_msi_irq_domain_alloc() (git-fixes).\n- PCI: keystone: Let AM65 use the pci_ops defined in pcie-designware-host.c (git-fixes).\n- PCI: mediatek: Add missing of_node_put() to fix reference leak (git-fixes).\n- PCI: tegra: Fix ASPM-L1SS advertisement disable code (git-fixes).\n- PCI: tegra: Move \u0027dbi\u0027 accesses to post common DWC initialization (git-fixes).\n- PCI: thunder: Fix compile testing (git-fixes).\n- PCI: xgene-msi: Fix race in installing chained irq handler (git-fixes).\n- PM / devfreq: Use more accurate returned new_freq as resume_freq (git-fixes).\n- PM: EM: postpone creating the debugfs dir till fs_initcall (git-fixes).\n- PM: runtime: Add documentation for pm_runtime_resume_and_get() (git-fixes).\n- PM: runtime: Add pm_runtime_resume_and_get to deal with usage counter (bsc#1183366).\n- PM: runtime: Fix ordering in pm_runtime_get_suppliers() (git-fixes).\n- PM: runtime: Fix ordering in pm_runtime_get_suppliers() (git-fixes).\n- PM: runtime: Fix race getting/putting suppliers at probe (git-fixes).\n- Platform: OLPC: Fix probe error handling (git-fixes).\n- RAS/CEC: Correct ce_add_elem()\u0027s returned values (bsc#1152489).\n- RDMA/addr: create addr_wq with WQ_MEM_RECLAIM flag (bsc#1183346).\n- RDMA/cm: Fix IRQ restore in ib_send_cm_sidr_rep (jsc#SLE-15176).\n- RDMA/core: create ib_cm with WQ_MEM_RECLAIM flag (bsc#1183346).\n- RDMA/hns: Delete redundant abnormal interrupt status (git-fixes).\n- RDMA/hns: Delete redundant condition judgment related to eq (git-fixes).\n- RDMA/mlx5: Fix drop packet rule in egress table (jsc#SLE-15175).\n- RDMA/qedr: Fix error return code in qedr_iw_connect() (jsc#SLE-8215).\n- RDMA/rtrs-clt: Close rtrs client conn before destroying rtrs clt session files (jsc#SLE-15176).\n- RDMA/rtrs-clt: destroy sysfs after removing session from active list (jsc#SLE-15176).\n- RDMA/srp: Fix support for unpopulated and unbalanced NUMA nodes (bsc#1169709)\n- RDMA/srp: Fix support for unpopulated and unbalanced NUMA nodes (bsc#1169709)\n- RDMA/srpt: Fix error return code in srpt_cm_req_recv() (git-fixes).\n- Re-enable yenta socket driver for x86_64 (bsc#1186349)\n- SUNRPC in case of backlog, hand free slots directly to waiting task (bsc#1185428).\n- USB: Add LPM quirk for Lenovo ThinkPad USB-C Dock Gen2 Ethernet (git-fixes).\n- USB: Add reset-resume quirk for WD19\u0027s Realtek Hub (git-fixes).\n- USB: CDC-ACM: fix poison/unpoison imbalance (bsc#1184984).\n- USB: CDC-ACM: fix poison/unpoison imbalance (git-fixes).\n- USB: cdc-acm: downgrade message to debug (git-fixes).\n- USB: cdc-acm: fix TIOCGSERIAL implementation (git-fixes).\n- USB: cdc-acm: fix double free on probe failure (git-fixes).\n- USB: cdc-acm: fix unprivileged TIOCCSERIAL (git-fixes).\n- USB: cdc-acm: fix use-after-free after probe failure (git-fixes).\n- USB: cdc-acm: untangle a circular dependency between callback and softint (git-fixes).\n- USB: gadget: u_ether: Fix a configfs return code (git-fixes).\n- USB: gadget: udc: fix wrong pointer passed to IS_ERR() and PTR_ERR() (git-fixes).\n- USB: quirks: ignore remote wake-up on Fibocom L850-GL LTE modem (git-fixes).\n- USB: replace hardcode maximum usb string length by definition (git-fixes).\n- USB: serial: ark3116: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: ch341: add new Product ID (git-fixes).\n- USB: serial: cp210x: add ID for Acuity Brands nLight Air Adapter (git-fixes).\n- USB: serial: cp210x: add some more GE USB IDs (git-fixes).\n- USB: serial: f81232: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: f81534: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: fix return value for unsupported ioctls (git-fixes).\n- USB: serial: io_edgeport: fix memory leak in edge_startup (git-fixes).\n- USB: serial: mos7720: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: opticon: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: pl2303: add support for PL2303HXN (bsc#1186320).\n- USB: serial: pl2303: fix line-speed handling on newer chips (bsc#1186320).\n- USB: serial: quatech2: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: ssu100: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: ti_usb_3410_5052: fix TIOCSSERIAL permission check (git-fixes).\n- USB: serial: usb_wwan: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: usb_wwan: fix TIOCSSERIAL jiffies conversions (git-fixes).\n- USB: serial: usb_wwan: fix unprivileged TIOCCSERIAL (git-fixes).\n- USB: usblp: fix a hang in poll() if disconnected (git-fixes).\n- Update bug reference for USB-audio fixes (bsc#1182552 bsc#1183598)\n- amd/amdgpu: Disable VCN DPG mode for Picasso (git-fixes).\n- amdgpu: avoid incorrect %hu format string (git-fixes).\n- apparmor: Fix aa_label refcnt leak in policy_update (git-fixes).\n- apparmor: check/put label on apparmor_sk_clone_security() (git-fixes).\n- appletalk: Fix skb allocation size in loopback case (git-fixes).\n- arm64: make STACKPROTECTOR_PER_TASK configurable (bsc#1181862).\n- ata: ahci: Disable SXS for Hisilicon Kunpeng920 (git-fixes).\n- ata: libahci_platform: fix IRQ check (git-fixes).\n- ath10k: Fix a use after free in ath10k_htc_send_bundle (git-fixes).\n- ath10k: Fix ath10k_wmi_tlv_op_pull_peer_stats_info() unlock without lock (git-fixes).\n- ath10k: fix wmi mgmt tx queue full due to race condition (git-fixes).\n- ath10k: hold RCU lock when calling ieee80211_find_sta_by_ifaddr() (git-fixes).\n- ath9k: Fix error check in ath9k_hw_read_revisions() for PCI devices (git-fixes).\n- ath9k: fix transmitting to stations in dynamic SMPS mode (git-fixes).\n- atl1c: fix error return code in atl1c_probe() (git-fixes).\n- atl1e: fix error return code in atl1e_probe() (git-fixes).\n- backlight: journada720: Fix Wmisleading-indentation warning (git-fixes).\n- batman-adv: initialize \u0027struct batadv_tvlv_tt_vlan_data\u0027-\u003ereserved field (git-fixes).\n- binfmt_misc: fix possible deadlock in bm_register_write (git-fixes).\n- binfmt_misc: fix possible deadlock in bm_register_write (git-fixes).\n- blk-iocost: ioc_pd_free() shouldn\u0027t assume irq disabled (git-fixes).\n- blk-mq: plug request for shared sbitmap (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).\n- blk-mq: set default elevator as deadline in case of hctx shared tagset (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).\n- blkcg: fix memleak for iolatency (git-fixes).\n- block, bfq: set next_rq to waker_bfqq-\u003enext_rq in waker injection (bsc#1168838).\n- block: fix get_max_io_size() (git-fixes).\n- block: recalculate segment count for multi-segment discards correctly (bsc#1184724).\n- block: rsxx: fix error return code of rsxx_pci_probe() (git-fixes).\n- block: rsxx: select CONFIG_CRC32 (git-fixes).\n- bluetooth: eliminate the potential race condition when removing the HCI controller (git-fixes).\n- bnxt_en: Fix RX consumer index logic in the error path (git-fixes).\n- bnxt_en: Fix RX consumer index logic in the error path (git-fixes).\n- bnxt_en: fix ternary sign extension bug in bnxt_show_temp() (git-fixes).\n- bnxt_en: reliably allocate IRQ table on reset to avoid crash (jsc#SLE-8371 bsc#1153274).\n- bnxt_en: reverse order of TX disable and carrier off (git-fixes).\n- bpf, sockmap: Fix sk-\u003eprot unhash op reset (bsc#1155518).\n- bpf,x64: Pad NOPs to make images converge more easily (bsc#1178163).\n- bpf: Add sanity check for upper ptr_limit (bsc#1183686 bsc#1183775).\n- bpf: Avoid warning when re-casting __bpf_call_base into __bpf_call_base_args (bsc#1155518).\n- bpf: Declare __bpf_free_used_maps() unconditionally (bsc#1155518).\n- bpf: Do not do bpf_cgroup_storage_set() for kuprobe/tp programs (bsc#1155518).\n- bpf: Enforce that struct_ops programs be GPL-only (bsc#1177028).\n- bpf: Fix 32 bit src register truncation on div/mod (bsc#1184170).\n- bpf: Fix an unitialized value in bpf_iter (bsc#1177028).\n- bpf: Fix leakage of uninitialized bpf stack under speculation (bsc#1155518).\n- bpf: Fix masking negation logic upon negative dst register (bsc#1155518).\n- bpf: Fix propagation of 32 bit unsigned bounds from 64 bit bounds (bsc#1177028).\n- bpf: Fix verifier jsgt branch analysis on max bound (bsc#1155518).\n- bpf: Refcount task stack in bpf_get_task_stack (bsc#1177028).\n- bpf: Remove MTU check in __bpf_skb_max_len (bsc#1155518).\n- bpf: Simplify alu_limit masking for pointer arithmetic (bsc#1183686 bsc#1183775).\n- bpf: link: Refuse non-O_RDWR flags in BPF_OBJ_GET (bsc#1177028).\n- bpf_lru_list: Read double-checked variable once without lock (bsc#1155518).\n- brcmfmac: Add DMI nvram filename quirk for Predia Basic tablet (git-fixes).\n- brcmfmac: Add DMI nvram filename quirk for Voyo winpad A15 tablet (git-fixes).\n- brcmfmac: clear EAP/association status bits on linkdown events (git-fixes).\n- bsg: free the request before return error code (git-fixes).\n- btrfs: abort the transaction if we fail to inc ref in btrfs_copy_root (bsc#1184217).\n- btrfs: always pin deleted leaves when there are active tree mod log users (bsc#1184224).\n- btrfs: fix exhaustion of the system chunk array due to concurrent allocations (bsc#1183386).\n- btrfs: fix extent buffer leak on failure to copy root (bsc#1184218).\n- btrfs: fix qgroup data rsv leak caused by falloc failure (bsc#1185549).\n- btrfs: fix race between swap file activation and snapshot creation (bsc#1185587).\n- btrfs: fix race between swap file activation and snapshot creation (bsc#1185587).\n- btrfs: fix race between transaction aborts and fsyncs leading to use-after-free (bsc#1186441).\n- btrfs: fix race between transaction aborts and fsyncs leading to use-after-free (bsc#1186441).\n- btrfs: fix race between writes to swap files and scrub (bsc#1185586).\n- btrfs: fix race between writes to swap files and scrub (bsc#1185586).\n- btrfs: fix race when cloning extent buffer during rewind of an old root (bsc#1184193).\n- btrfs: fix race when picking most recent mod log operation for an old root (bsc#1186439).\n- btrfs: fix race when picking most recent mod log operation for an old root (bsc#1186439).\n- btrfs: fix stale data exposure after cloning a hole with NO_HOLES enabled (bsc#1184220).\n- btrfs: fix subvolume/snapshot deletion not triggered on mount (bsc#1184219).\n- btrfs: track qgroup released data in own variable in insert_prealloc_file_extent (bsc#1185549).\n- bus: fsl-mc: add the dpdbg device type (bsc#1185670).\n- bus: fsl-mc: list more commands as accepted through the ioctl (bsc#1185670).\n- bus: omap_l3_noc: mark l3 irqs as IRQF_NO_THREAD (git-fixes).\n- bus: qcom: Put child node before return (git-fixes).\n- bus: ti-sysc: Fix warning on unbind if reset is not deasserted (git-fixes).\n- can: c_can: move runtime PM enable/disable to c_can_platform (git-fixes).\n- can: c_can_pci: c_can_pci_remove(): fix use-after-free (git-fixes).\n- can: flexcan: assert FRZ bit in flexcan_chip_freeze() (git-fixes).\n- can: flexcan: enable RX FIFO after FRZ/HALT valid (git-fixes).\n- can: flexcan: flexcan_chip_freeze(): fix chip freeze for missing bitrate (git-fixes).\n- can: flexcan: invoke flexcan_chip_freeze() to enter freeze mode (git-fixes).\n- can: m_can: m_can_do_rx_poll(): fix extraneous msg loss warning (git-fixes).\n- can: peak_usb: Revert \u0027can: peak_usb: add forgotten supported devices\u0027 (git-fixes).\n- can: peak_usb: add forgotten supported devices (git-fixes).\n- can: skb: can_skb_set_owner(): fix ref counting if socket was closed before setting skb ownership (git-fixes).\n- cdc-acm: fix BREAK rx code path adding necessary calls (git-fixes).\n- cdc-wdm: untangle a circular dependency between callback and softint (git-fixes).\n- ceph: do not clobber i_snap_caps on non-I_NEW inode (bsc#1186501).\n- ceph: fix inode leak on getattr error in __fh_to_dentry (bsc#1186501).\n- ceph: fix up error handling with snapdirs (bsc#1186501).\n- ceph: only check pool permissions for regular files (bsc#1186501).\n- cfg80211: remove WARN_ON() in cfg80211_sme_connect (git-fixes).\n- cfg80211: scan: drop entry from hidden_list on overflow (git-fixes).\n- ch_ktls: Fix kernel panic (jsc#SLE-15131).\n- ch_ktls: do not send snd_una update to TCB in middle (jsc#SLE-15131).\n- ch_ktls: fix device connection close (jsc#SLE-15131).\n- ch_ktls: fix enum-conversion warning (jsc#SLE-15129).\n- ch_ktls: tcb close causes tls connection failure (jsc#SLE-15131).\n- cifs: New optype for session operations (bsc#1181507).\n- cifs: Tracepoints and logs for tracing credit changes (bsc#1181507).\n- cifs: change noisy error message to FYI (bsc#1181507).\n- cifs: check pointer before freeing (bsc#1183534).\n- cifs: do not send close in compound create+close requests (bsc#1181507).\n- cifs: print MIDs in decimal notation (bsc#1181507).\n- cifs: return proper error code in statfs(2) (bsc#1181507).\n- cifs_debug: use %pd instead of messing with -\u003ed_name (bsc#1181507).\n- clk: exynos7: Mark aclk_fsys1_200 as critical (git-fixes).\n- clk: fix invalid usage of list cursor in register (git-fixes).\n- clk: fix invalid usage of list cursor in unregister (git-fixes).\n- clk: mvebu: armada-37xx-periph: Fix switching CPU freq from 250 Mhz to 1 GHz (git-fixes).\n- clk: mvebu: armada-37xx-periph: Fix workaround for switching from L1 to L0 (git-fixes).\n- clk: mvebu: armada-37xx-periph: remove .set_parent method for CPU PM clock (git-fixes).\n- clk: qcom: a53-pll: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- clk: socfpga: arria10: Fix memory leak of socfpga_clk on error return (git-fixes).\n- clk: socfpga: fix iomem pointer cast on 64-bit (git-fixes).\n- clk: uniphier: Fix potential infinite loop (git-fixes).\n- clk: zynqmp: move zynqmp_pll_set_mode out of round_rate callback (git-fixes).\n- completion: Drop init_completion define (git-fixes).\n- configfs: fix a use-after-free in __configfs_open_file (git-fixes).\n- coresight: etm4x: Fix issues on trcseqevr access (git-fixes).\n- coresight: etm4x: Fix save and restore of TRCVMIDCCTLR1 register (git-fixes).\n- coresight: remove broken __exit annotations (git-fixes).\n- coresight: tmc-etr: Fix barrier packet insertion for perf buffer (git-fixes).\n- cpufreq: Kconfig: fix documentation links (git-fixes).\n- cpufreq: armada-37xx: Fix determining base CPU frequency (git-fixes).\n- cpufreq: armada-37xx: Fix driver cleanup when registration failed (git-fixes).\n- cpufreq: armada-37xx: Fix setting TBG parent for load levels (git-fixes).\n- cpufreq: armada-37xx: Fix the AVS value for load L1 (git-fixes).\n- cpufreq: intel_pstate: Add Icelake servers support in no-HWP mode (bsc#1185758).\n- cpuidle/pseries: Fixup CEDE0 latency only for POWER10 onwards (bsc#1185550 ltc#192610).\n- crypto: api - check for ERR pointers in crypto_destroy_tfm() (git-fixes).\n- crypto: arm/curve25519 - Move \u0027.fpu\u0027 after \u0027.arch\u0027 (git-fixes).\n- crypto: chelsio - Read rxchannel-id from firmware (git-fixes).\n- crypto: mips/poly1305 - enable for all MIPS processors (git-fixes).\n- crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init (git-fixes).\n- crypto: qat - Fix a double free in adf_create_ring (git-fixes).\n- crypto: qat - do not release uninitialized resources (git-fixes).\n- crypto: qat - fix error path in adf_isr_resource_alloc() (git-fixes).\n- crypto: qat - fix unmap invalid dma address (git-fixes).\n- crypto: rng - fix crypto_rng_reset() refcounting when !CRYPTO_STATS (git-fixes).\n- crypto: stm32/cryp - Fix PM reference leak on stm32-cryp.c (git-fixes).\n- crypto: stm32/hash - Fix PM reference leak on stm32-hash.c (git-fixes).\n- crypto: tcrypt - avoid signed overflow in byte count (git-fixes).\n- cxgb4/chtls/cxgbit: Keeping the max ofld immediate data size same in cxgb4 and ulds (git-fixes).\n- cxgb4/chtls/cxgbit: Keeping the max ofld immediate data size same in cxgb4 and ulds (git-fixes).\n- cxgb4: Fix unintentional sign extension issues (git-fixes).\n- cxgb4: avoid collecting SGE_QBASE regs during traffic (git-fixes).\n- dm era: Fix bitset memory leaks (git-fixes).\n- dm era: Recover committed writeset after crash (git-fixes).\n- dm era: Reinitialize bitset cache before digesting a new writeset (git-fixes).\n- dm era: Update in-core bitset after committing the metadata (git-fixes).\n- dm era: Use correct value size in equality function of writeset tree (git-fixes).\n- dm era: Verify the data block size hasn\u0027t changed (git-fixes).\n- dm era: only resize metadata in preresume (git-fixes).\n- dm integrity: fix error reporting in bitmap mode after creation (git-fixes).\n- dm ioctl: fix error return code in target_message (git-fixes).\n- dm mpath: fix racey management of PG initialization (git-fixes).\n- dm mpath: switch paths in dm_blk_ioctl() code path (bsc#1167574, bsc#1175995, bsc#1184485).\n- dm raid: fix discard limits for raid1 (git-fixes).\n- dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails (bsc#1185581).\n- dm writecache: fix the maximum number of arguments (git-fixes).\n- dm writecache: handle DAX to partitions on persistent memory correctly (git-fixes).\n- dm writecache: remove BUG() and fail gracefully instead (git-fixes).\n- dm zoned: select CONFIG_CRC32 (git-fixes).\n- dm: avoid filesystem lookup in dm_get_dev_t() (git-fixes).\n- dm: eliminate potential source of excessive kernel log noise (git-fixes).\n- dm: fix bug with RCU locking in dm_blk_report_zones (git-fixes).\n- dm: remove invalid sparse __acquires and __releases annotations (git-fixes).\n- dmaengine: Fix a double free in dma_async_device_register (git-fixes).\n- dmaengine: dw-edma: Fix crash on loading/unloading driver (git-fixes).\n- dmaengine: dw: Make it dependent to HAS_IOMEM (git-fixes).\n- dmaengine: idxd: Fix clobbering of SWERR overflow bit on writeback (git-fixes).\n- dmaengine: idxd: Fix potential null dereference on pointer status (git-fixes).\n- dmaengine: idxd: cleanup pci interrupt vector allocation management (git-fixes).\n- dmaengine: idxd: clear MSIX permission entry on shutdown (git-fixes).\n- dmaengine: idxd: fix cdev setup and free device lifetime issues (git-fixes).\n- dmaengine: idxd: fix delta_rec and crc size field for completion record (git-fixes).\n- dmaengine: idxd: fix dma device lifetime (git-fixes).\n- dmaengine: idxd: fix opcap sysfs attribute output (git-fixes).\n- dmaengine: idxd: fix wq cleanup of WQCFG registers (git-fixes).\n- dmaengine: idxd: fix wq size store permission state (git-fixes).\n- dmaengine: idxd: removal of pcim managed mmio mapping (git-fixes).\n- docs: kernel-parameters: Add gpio_mockup_named_lines (git-fixes).\n- docs: kernel-parameters: Move gpio-mockup for alphabetic order (git-fixes).\n- dpaa_eth: Remove unnecessary boolean expression in dpaa_get_headroom (git-fixes).\n- dpaa_eth: Use random MAC address when none is given (bsc#1184811).\n- dpaa_eth: copy timestamp fields to new skb in A-050385 workaround (git-fixes).\n- dpaa_eth: fix the RX headroom size alignment (git-fixes).\n- dpaa_eth: update the buffer layout for non-A050385 erratum scenarios (git-fixes).\n- drivers: hv: Fix whitespace errors (bsc#1185725).\n- drivers: net: xgene: Fix the order of the arguments of \u0027alloc_etherdev_mqs()\u0027 (git-fixes).\n- drivers: video: fbcon: fix NULL dereference in fbcon_cursor() (git-fixes).\n- drivers: video: fbcon: fix NULL dereference in fbcon_cursor() (git-fixes).\n- drm/amd/display/dc/dce/dce_aux: Remove duplicate line causing \u0027field overwritten\u0027 issue (git-fixes).\n- drm/amd/display: Check for DSC support instead of ASIC revision (git-fixes).\n- drm/amd/display: Correct algorithm for reversed gamma (git-fixes).\n- drm/amd/display: DCHUB underflow counter increasing in some scenarios (git-fixes).\n- drm/amd/display: Do not optimize bandwidth before disabling planes (git-fixes).\n- drm/amd/display: Fix UBSAN warning for not a valid value for type \u0027_Bool\u0027 (git-fixes).\n- drm/amd/display: Fix UBSAN: shift-out-of-bounds warning (git-fixes).\n- drm/amd/display: Fix debugfs link_settings entry (git-fixes).\n- drm/amd/display: Fix nested FPU context in dcn21_validate_bandwidth() (git-fixes).\n- drm/amd/display: Fix off by one in hdmi_14_process_transaction() (git-fixes).\n- drm/amd/display: Fix two cursor duplication when using overlay (git-fixes).\n- drm/amd/display: Force vsync flip when reconfiguring MPCC (git-fixes).\n- drm/amd/display: Guard against NULL pointer deref when get_i2c_info fails (git-fixes).\n- drm/amd/display: Initialize attribute for hdcp_srm sysfs file (git-fixes).\n- drm/amd/display: Reject non-zero src_y and src_x for video planes (git-fixes).\n- drm/amd/display: Revert dram_clock_change_latency for DCN2.1 (git-fixes).\n- drm/amd/display: Try YCbCr420 color when YCbCr444 fails (git-fixes).\n- drm/amd/display: add handling for hdcp2 rx id list validation (git-fixes).\n- drm/amd/display: changing sr exit latency (git-fixes).\n- drm/amd/display: fix dml prefetch validation (git-fixes).\n- drm/amd/display: fixed divide by zero kernel crash during dsc enablement (git-fixes).\n- drm/amd/display: turn DPMS off on connector unplug (git-fixes).\n- drm/amd/pm: fix workload mismatch on vega10 (git-fixes).\n- drm/amd/powerplay: fix spelling mistake \u0027smu_state_memroy_block\u0027 -\u003e (bsc#1152489) Backporting notes: \t* rename amd/pm to amd/powerplay \t* context changes\n- drm/amdgpu : Fix asic reset regression issue introduce by 8f211fe8ac7c4f (git-fixes).\n- drm/amdgpu/display/dm: add missing parameter documentation (git-fixes).\n- drm/amdgpu/display: buffer INTERRUPT_LOW_IRQ_CONTEXT interrupt work (git-fixes).\n- drm/amdgpu/display: remove redundant continue statement (git-fixes).\n- drm/amdgpu/display: restore AUX_DPHY_TX_CONTROL for DCN2.x (git-fixes).\n- drm/amdgpu/display: use GFP_ATOMIC in dcn21_validate_bandwidth_fp() (git-fixes).\n- drm/amdgpu/swsmu: add interrupt work function (git-fixes).\n- drm/amdgpu/swsmu: add interrupt work handler for smu11 parts (git-fixes).\n- drm/amdgpu: Add additional Sienna Cichlid PCI ID (git-fixes).\n- drm/amdgpu: Add check to prevent IH overflow (git-fixes).\n- drm/amdgpu: Add mem sync flag for IB allocated by SA (git-fixes).\n- drm/amdgpu: Fix GPU TLB update error when PAGE_SIZE \u003e AMDGPU_PAGE_SIZE (git-fixes).\n- drm/amdgpu: Fix some unload driver issues (git-fixes).\n- drm/amdgpu: Init GFX10_ADDR_CONFIG for VCN v3 in DPG mode (git-fixes).\n- drm/amdgpu: check alignment on CPU page for bo map (git-fixes).\n- drm/amdgpu: disable 3DCGCG on picasso/raven1 to avoid compute hang (git-fixes).\n- drm/amdgpu: fb BO should be ttm_bo_type_device (git-fixes).\n- drm/amdgpu: fix NULL pointer dereference (git-fixes).\n- drm/amdgpu: fix concurrent VM flushes on Vega/Navi v2 (git-fixes).\n- drm/amdgpu: fix offset calculation in amdgpu_vm_bo_clear_mappings() (git-fixes).\n- drm/amdgpu: fix parameter error of RREG32_PCIE() in amdgpu_regs_pcie (git-fixes).\n- drm/amdgpu: mask the xgmi number of hops reported from psp to kfd (git-fixes).\n- drm/amdgpu: remove unused variable from struct amdgpu_bo (git-fixes).\n- drm/amdgpu: update gc golden setting for Navi12 (git-fixes).\n- drm/amdgpu: update sdma golden setting for Navi12 (git-fixes).\n- drm/amdkfd: Fix UBSAN shift-out-of-bounds warning (git-fixes).\n- drm/amdkfd: Fix cat debugfs hang_hws file causes system crash bug (git-fixes).\n- drm/amdkfd: Put ACPI table after using it (bsc#1152489) Backporting notes: \t* context changes\n- drm/amdkfd: dqm fence memory corruption (git-fixes).\n- drm/amdkfd: fix build error with AMD_IOMMU_V2=m (git-fixes).\n- drm/ast: AST2500 fixups (bsc#1174416).\n- drm/ast: AST2500 fixups (bsc#1174416).\n- drm/ast: Add 25MHz refclk support (bsc#1174416).\n- drm/ast: Add 25MHz refclk support (bsc#1174416).\n- drm/ast: Add support for 1152x864 mode (bsc#1174416).\n- drm/ast: Add support for 1152x864 mode (bsc#1174416).\n- drm/ast: Add support for AIP200 (bsc#1174416).\n- drm/ast: Add support for AIP200 (bsc#1174416).\n- drm/ast: Correct mode table for AST2500 precatch (bsc#1174416).\n- drm/ast: Correct mode table for AST2500 precatch (bsc#1174416).\n- drm/ast: Disable VGA decoding while driver is active (bsc#1174416).\n- drm/ast: Disable VGA decoding while driver is active (bsc#1174416).\n- drm/ast: Disable screen on register init (bsc#1174416).\n- drm/ast: Disable screen on register init (bsc#1174416).\n- drm/ast: Fix P2A config detection (bsc#1174416).\n- drm/ast: Fix P2A config detection (bsc#1174416).\n- drm/ast: Fix invalid usage of AST_MAX_HWC_WIDTH in cursor atomic_check (git-fixes).\n- drm/ast: Fix register access in non-P2A mode for DP501 (bsc#1174416).\n- drm/ast: Fix register access in non-P2A mode for DP501 (bsc#1174416).\n- drm/ast: Keep MISC fields when enabling VGA (bsc#1174416).\n- drm/ast: Keep MISC fields when enabling VGA (bsc#1174416).\n- drm/ast: drm/ast: Fix boot address for AST2500 (bsc#1174416).\n- drm/ast: drm/ast: Fix boot address for AST2500 (bsc#1174416).\n- drm/compat: Clear bounce structures (git-fixes).\n- drm/dp_mst: Revise broadcast msg lct \u0026 lcr (git-fixes).\n- drm/dp_mst: Set CLEAR_PAYLOAD_ID_TABLE as broadcast (git-fixes).\n- drm/hisilicon: Fix use-after-free (git-fixes).\n- drm/i915/display: fix compiler warning about array overrun (git-fixes).\n- drm/i915/gt: Clear CACHE_MODE prior to clearing residuals (git-fixes).\n- drm/i915/gt: Disable HiZ Raw Stall Optimization on broken gen7 (git-fixes).\n- drm/i915/gvt: Fix error code in intel_gvt_init_device() (git-fixes).\n- drm/i915/gvt: Set SNOOP for PAT3 on BXT/APL to workaround GPU BB hang (git-fixes).\n- drm/i915/overlay: Fix active retire callback alignment (git-fixes).\n- drm/i915/selftests: Fix some error codes (git-fixes).\n- drm/i915: Avoid div-by-zero on gen2 (git-fixes).\n- drm/i915: Fix ICL MG PHY vswing handling (git-fixes).\n- drm/i915: Fix crash in auto_retire (git-fixes).\n- drm/i915: Fix invalid access to ACPI _DSM objects (bsc#1184074).\n- drm/i915: Hold onto an explicit ref to i915_vma_work.pinned (git-fixes).\n- drm/i915: Read C0DRB3/C1DRB3 as 16 bits again (git-fixes).\n- drm/i915: Wedge the GPU if command parser setup fails (git-fixes).\n- drm/imx: imx-ldb: fix out of bounds array access warning (git-fixes).\n- drm/ingenic: Fix non-OSD mode (git-fixes).\n- drm/ingenic: Register devm action to cleanup encoders (git-fixes).\n- drm/komeda: Fix bit check to import to value of proper type (git-fixes).\n- drm/lima: fix reference leak in lima_pm_busy (git-fixes).\n- drm/mcde/panel: Inverse misunderstood flag (git-fixes).\n- drm/mediatek: Fix aal size config (bsc#1152489) Backporting notes: \t* replaced mtk_ddp_write() with writel()\n- drm/msm/a5xx: Remove overwriting A5XX_PC_DBG_ECO_CNTL register (git-fixes).\n- drm/msm/adreno: a5xx_power: Do not apply A540 lm_setup to other GPUs (git-fixes).\n- drm/msm/gem: Add obj-\u003elock wrappers (bsc#1152489) Backporting notes: \t* taken for 9b73bde39cf2 (\u0027drm/msm: Fix use-after-free in msm_gem with carveout\u0027) \t* context changes\n- drm/msm/mdp5: Configure PP_SYNC_HEIGHT to double the vtotal (git-fixes).\n- drm/msm/mdp5: Do not multiply vclk line count by 100 (git-fixes).\n- drm/msm: Fix WARN_ON() splat in _free_object() (bsc#1152489) Backporting notes: \t* context changes\n- drm/msm: Fix a5xx/a6xx timestamps (git-fixes).\n- drm/msm: Fix races managing the OOB state for timestamp vs (bsc#1152489) Backporting notes: \t* context changes\n- drm/msm: Fix suspend/resume on i.MX5 (git-fixes).\n- drm/msm: Fix use-after-free in msm_gem with carveout (bsc#1152489) Backporting notes: \t* context changes\n- drm/msm: Ratelimit invalid-fence message (git-fixes).\n- drm/msm: Set drvdata to NULL when msm_drm_init() fails (git-fixes).\n- drm/msm: fix shutdown hook in case GPU components failed to bind (git-fixes).\n- drm/nouveau/kms/nv50-: Get rid of bogus nouveau_conn_mode_valid() (git-fixes).\n- drm/omap: fix misleading indentation in pixinc() (git-fixes).\n- drm/panfrost: Clear MMU irqs before handling the fault (git-fixes).\n- drm/panfrost: Do not corrupt the queue mutex on open/close (bsc#1152472) Backporting notes: \t* context changes\n- drm/panfrost: Do not try to map pages that are already mapped (git-fixes).\n- drm/panfrost: Fix job timeout handling (bsc#1152472) Backporting notes: \t* context changes\n- drm/panfrost: Remove unused variables in panfrost_job_close() (bsc#1152472)\n- drm/probe-helper: Check epoch counter in output_poll_execute() (git-fixes).\n- drm/qxl: do not run release if qxl failed to init (git-fixes).\n- drm/radeon/dpm: Disable sclk switching on Oland when two 4K 60Hz monitors are connected (git-fixes).\n- drm/radeon: Avoid power table parsing memory leaks (git-fixes).\n- drm/radeon: Fix a missing check bug in radeon_dp_mst_detect() (git-fixes).\n- drm/radeon: Fix off-by-one power_state index heap overwrite (git-fixes).\n- drm/radeon: fix AGP dependency (git-fixes).\n- drm/radeon: fix copy of uninitialized variable back to userspace (git-fixes).\n- drm/shmem-helper: Check for purged buffers in fault handler (git-fixes).\n- drm/shmem-helper: Do not remove the offset in vm_area_struct pgoff (git-fixes).\n- drm/shmem-helpers: vunmap: Do not put pages for dma-buf (git-fixes).\n- drm/sun4i: tcon: fix inverted DCLK polarity (bsc#1152489) Backporting notes: \t* context changes\n- drm/tegra: Fix reference leak when pm_runtime_get_sync() fails (git-fixes).\n- drm/tegra: dc: Do not set PLL clock to 0Hz (git-fixes).\n- drm/tegra: dc: Restore coupling of display controllers (git-fixes).\n- drm/tegra: sor: Grab runtime PM reference across reset (git-fixes).\n- drm/tilcdc: send vblank event when disabling crtc (git-fixes).\n- drm/vc4: crtc: Reduce PV fifo threshold on hvs4 (git-fixes).\n- drm/vc4: hdmi: Restore cec physical address on reconnect (bsc#1152472) Backporting notes: \t* context changes \t* change vc4_hdmi to vc4-\u003ehdmi \t* removed references to encoder-\u003ehdmi_monitor\n- drm/vkms: fix misuse of WARN_ON (git-fixes).\n- drm: Added orientation quirk for OneGX1 Pro (git-fixes).\n- drm: meson_drv add shutdown function (git-fixes).\n- drm: rcar-du: Fix PM reference leak in rcar_cmm_enable() (git-fixes).\n- drm: rcar-du: Fix crash when using LVDS1 clock for CRTC (bsc#1152489) Backporting notes: \t* context changes\n- drm: rcar-du: Fix leak of CMM platform device reference (git-fixes).\n- drm: xlnx: zynqmp: fix a memset in zynqmp_dp_train() (git-fixes).\n- e1000e: Fix duplicate include guard (git-fixes).\n- e1000e: Fix error handling in e1000_set_d0_lplu_state_82571 (git-fixes).\n- e1000e: add rtnl_lock() to e1000_reset_task (git-fixes).\n- efi: use 32-bit alignment for efi_guid_t literals (git-fixes).\n- enetc: Fix reporting of h/w packet counters (git-fixes).\n- enetc: Let the hardware auto-advance the taprio base-time of 0 (git-fixes).\n- enetc: Workaround for MDIO register access issue (git-fixes).\n- epoll: check for events when removing a timed out thread from the wait queue (git-fixes).\n- ethernet/netronome/nfp: Fix a use after free in nfp_bpf_ctrl_msg_rx (git-fixes).\n- ethernet: alx: fix order of calls on resume (git-fixes).\n- ethernet:enic: Fix a use after free bug in enic_hard_start_xmit (git-fixes).\n- ethtool: fix incorrect datatype in set_eee ops (bsc#1176447).\n- ethtool: fix missing NLM_F_MULTI flag when dumping (bsc#1176447).\n- ethtool: pause: make sure we init driver stats (jsc#SLE-15075).\n- exec: Move would_dump into flush_old_exec (git-fixes).\n- ext4: do not try to set xattr into ea_inode if value is empty (bsc#1184730).\n- ext4: find old entry again if failed to rename whiteout (bsc#1184742).\n- ext4: fix potential error in ext4_do_update_inode (bsc#1184731).\n- ext4: fix potential htree index checksum corruption (bsc#1184728).\n- extcon: Add stubs for extcon_register_notifier_all() functions (git-fixes).\n- extcon: Fix error handling in extcon_dev_register (git-fixes).\n- extcon: arizona: Fix some issues when HPDET IRQ fires after the jack has been unplugged (git-fixes).\n- extcon: arizona: Fix various races on driver unbind (git-fixes).\n- fbdev: zero-fill colormap in fbcmap.c (git-fixes).\n- fbmem: add margin check to fb_check_caps() (git-fixes).\n- firmware/efi: Fix a use after bug in efi_mem_reserve_persistent (git-fixes).\n- firmware: arm_scpi: Prevent the ternary sign expansion bug (git-fixes).\n- firmware: qcom-scm: Fix QCOM_SCM configuration (git-fixes).\n- firmware: qcom_scm: Fix kernel-doc function names to match (git-fixes).\n- firmware: qcom_scm: Make __qcom_scm_is_call_available() return bool (git-fixes).\n- firmware: qcom_scm: Reduce locking section for __get_convention() (git-fixes).\n- firmware: qcom_scm: Workaround lack of \u0027is available\u0027 call on SC7180 (git-fixes).\n- flow_dissector: fix byteorder of dissected ICMP ID (bsc#1154353).\n- fnic: use scsi_host_busy_iter() to traverse commands (bsc#1179851).\n- fotg210-udc: Complete OUT requests on short packets (git-fixes).\n- fotg210-udc: Do not DMA more than the buffer can take (git-fixes).\n- fotg210-udc: Fix DMA on EP0 for length \u003e max packet size (git-fixes).\n- fotg210-udc: Fix EP0 IN requests bigger than two packets (git-fixes).\n- fotg210-udc: Mask GRP2 interrupts we do not handle (git-fixes).\n- fotg210-udc: Remove a dubious condition leading to fotg210_done (git-fixes).\n- fs/epoll: restore waking from ep_done_scan() (bsc#1183868).\n- fs/jfs: fix potential integer overflow on shift of a int (bsc#1184741).\n- fs: direct-io: fix missing sdio-\u003eboundary (bsc#1184736).\n- fsl/fman: check dereferencing null pointer (git-fixes).\n- fsl/fman: fix dereference null return value (git-fixes).\n- fsl/fman: fix eth hash table allocation (git-fixes).\n- fsl/fman: fix unreachable code (git-fixes).\n- fsl/fman: reuse set_mac_address() in dtsec init() (bsc#1184811).\n- fsl/fman: tolerate missing MAC address in device tree (bsc#1184811).\n- fsl/fman: use 32-bit unsigned integer (git-fixes).\n- ftrace/x86: Tell objtool to ignore nondeterministic ftrace stack layout (bsc#1177028).\n- ftrace: Fix modify_ftrace_direct (bsc#1177028).\n- ftrace: Handle commands when closing set_ftrace_filter file (git-fixes).\n- fuse: fix bad inode (bsc#1184211).\n- fuse: fix bad inode (bsc#1184211).\n- fuse: fix live lock in fuse_iget() (bsc#1184211).\n- fuse: fix live lock in fuse_iget() (bsc#1184211).\n- fuse: fix write deadlock (bsc#1185573).\n- fuse: verify write return (git-fixes).\n- futex: Change utime parameter to be \u0027const ... *\u0027 (git-fixes).\n- futex: Do not apply time namespace adjustment on FUTEX_LOCK_PI (bsc#1164648).\n- futex: Get rid of the val2 conditional dance (git-fixes).\n- futex: Make syscall entry points less convoluted (git-fixes).\n- gcc-plugins: drop support for GCC \u0026lt;= 4.7 (bcs#1181862).\n- gcc-plugins: make it possible to disable CONFIG_GCC_PLUGINS again (bcs#1181862).\n- gcc-plugins: simplify GCC plugin-dev capability test (bsc#1181862).\n- geneve: do not modify the shared tunnel info when PMTU triggers an ICMP reply (bsc#1176447).\n- geneve: do not modify the shared tunnel info when PMTU triggers an ICMP reply (git-fixes).\n- genirq/irqdomain: Do not try to free an interrupt that has no (git-fixes)\n- genirq: Disable interrupts for force threaded handlers (git-fixes)\n- genirq: Reduce irqdebug cacheline bouncing (bsc#1185703 ltc#192641).\n- gianfar: Account for Tx PTP timestamp in the skb headroom (git-fixes).\n- gianfar: Fix TX timestamping with a stacked DSA driver (git-fixes).\n- gianfar: Handle error code at MAC address change (git-fixes).\n- gianfar: Replace skb_realloc_headroom with skb_cow_head for PTP (git-fixes).\n- gpio: omap: Save and restore sysconfig (git-fixes).\n- gpio: pca953x: Set IRQ type when handle Intel Galileo Gen 2 (git-fixes).\n- gpio: sysfs: Obey valid_mask (git-fixes).\n- gpio: xilinx: Correct kernel doc for xgpio_probe() (git-fixes).\n- gpio: zynq: fix reference leak in zynq_gpio functions (git-fixes).\n- gpiolib: Do not free if pin ranges are not defined (git-fixes).\n- gpiolib: acpi: Add missing IRQF_ONESHOT (git-fixes).\n- gpiolib: acpi: Add quirk to ignore EC wakeups on Dell Venue 10 Pro 5055 (git-fixes).\n- gpu/xen: Fix a use after free in xen_drm_drv_init (git-fixes).\n- hrtimer: Update softirq_expires_next correctly after (git-fixes)\n- hv_netvsc: Reset the RSC count if NVSP_STAT_FAIL in netvsc_receive() (git-fixes).\n- hwmon: (ina3221) Fix PM usage counter unbalance in ina3221_write_enable (git-fixes).\n- hwmon: (occ) Fix poll rate limiting (git-fixes).\n- i2c: Add I2C_AQ_NO_REP_START adapter quirk (git-fixes).\n- i2c: bail out early when RDWR parameters are wrong (git-fixes).\n- i2c: cadence: add IRQ check (git-fixes).\n- i2c: emev2: add IRQ check (git-fixes).\n- i2c: img-scb: fix reference leak when pm_runtime_get_sync fails (git-fixes).\n- i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails (git-fixes).\n- i2c: jz4780: add IRQ check (git-fixes).\n- i2c: mlxbf: add IRQ check (git-fixes).\n- i2c: omap: fix reference leak when pm_runtime_get_sync fails (git-fixes).\n- i2c: rcar: faster irq code to minimize HW race condition (git-fixes).\n- i2c: rcar: optimize cacheline to minimize HW race condition (git-fixes).\n- i2c: sh7760: add IRQ check (git-fixes).\n- i2c: sh7760: fix IRQ error path (git-fixes).\n- i2c: sprd: fix reference leak when pm_runtime_get_sync fails (git-fixes).\n- i2c: tegra: Add missing pm_runtime_put() (bsc#1184386).\n- i2c: tegra: Check errors for both positive and negative values (bsc#1184386).\n- i2c: tegra: Clean up and improve comments (bsc#1184386).\n- i2c: tegra: Clean up printk messages (bsc#1184386).\n- i2c: tegra: Clean up probe function (bsc#1184386).\n- i2c: tegra: Clean up variable names (bsc#1184386).\n- i2c: tegra: Clean up variable types (bsc#1184386).\n- i2c: tegra: Clean up whitespaces, newlines and indentation (bsc#1184386).\n- i2c: tegra: Create i2c_writesl_vi() to use with VI I2C for filling TX FIFO (bsc#1184386).\n- i2c: tegra: Factor out error recovery from tegra_i2c_xfer_msg() (bsc#1184386).\n- i2c: tegra: Factor out hardware initialization into separate function (bsc#1184386).\n- i2c: tegra: Factor out packet header setup from tegra_i2c_xfer_msg() (bsc#1184386).\n- i2c: tegra: Factor out register polling into separate function (bsc#1184386).\n- i2c: tegra: Handle potential error of tegra_i2c_flush_fifos() (bsc#1184386).\n- i2c: tegra: Improve driver module description (bsc#1184386).\n- i2c: tegra: Improve formatting of variables (bsc#1184386).\n- i2c: tegra: Initialize div-clk rate unconditionally (bsc#1184386).\n- i2c: tegra: Make tegra_i2c_flush_fifos() usable in atomic transfer (bsc#1184386).\n- i2c: tegra: Mask interrupt in tegra_i2c_issue_bus_clear() (bsc#1184386).\n- i2c: tegra: Move out all device-tree parsing into tegra_i2c_parse_dt() (bsc#1184386).\n- i2c: tegra: Remove \u0027dma\u0027 variable from tegra_i2c_xfer_msg() (bsc#1184386).\n- i2c: tegra: Remove error message used for devm_request_irq() failure (bsc#1184386).\n- i2c: tegra: Remove i2c_dev.clk_divisor_non_hs_mode member (bsc#1184386).\n- i2c: tegra: Remove likely/unlikely from the code (bsc#1184386).\n- i2c: tegra: Remove outdated barrier() (bsc#1184386).\n- i2c: tegra: Remove redundant check in tegra_i2c_issue_bus_clear() (bsc#1184386).\n- i2c: tegra: Rename wait/poll functions (bsc#1184386).\n- i2c: tegra: Reorder location of functions in the code (bsc#1184386).\n- i2c: tegra: Runtime PM always available on Tegra (bsc#1184386).\n- i2c: tegra: Use clk-bulk helpers (bsc#1184386).\n- i2c: tegra: Use devm_platform_get_and_ioremap_resource() (bsc#1184386).\n- i2c: tegra: Use platform_get_irq() (bsc#1184386).\n- i2c: tegra: Use reset_control_reset() (bsc#1184386).\n- i2c: tegra: Use threaded interrupt (bsc#1184386).\n- i2c: tegra: Wait for config load atomically while in ISR (bsc#1184386).\n- i40e: Add zero-initialization of AQ command structures (git-fixes).\n- i40e: Added Asym_Pause to supported link modes (git-fixes).\n- i40e: Fix PHY type identifiers for 2.5G and 5G adapters (git-fixes).\n- i40e: Fix add TC filter for IPv6 (git-fixes).\n- i40e: Fix addition of RX filters after enabling FW LLDP agent (git-fixes).\n- i40e: Fix display statistics for veb_tc (git-fixes).\n- i40e: Fix endianness conversions (git-fixes).\n- i40e: Fix flow for IPv6 next header (extension header) (git-fixes).\n- i40e: Fix kernel oops when i40e driver removes VF\u0027s (git-fixes).\n- i40e: Fix overwriting flow control settings during driver loading (git-fixes).\n- i40e: Fix parameters in aq_get_phy_register() (jsc#SLE-8025).\n- i40e: Fix sparse error: \u0027vsi-\u003enetdev\u0027 could be null (jsc#SLE-8025).\n- i40e: Fix sparse error: uninitialized symbol \u0027ring\u0027 (jsc#SLE-13701).\n- i40e: Fix sparse errors in i40e_txrx.c (git-fixes).\n- i40e: Fix sparse errors in i40e_txrx.c (git-fixes).\n- i40e: Fix sparse warning: missing error code \u0027err\u0027 (git-fixes).\n- i40e: Fix use-after-free in i40e_client_subtask() (git-fixes).\n- i40e: fix broken XDP support (git-fixes).\n- i40e: fix the panic when running bpf in xdpdrv mode (git-fixes).\n- i40e: fix the restart auto-negotiation after FEC modified (git-fixes).\n- i915/perf: Start hrtimer only if sampling the OA buffer (git-fixes).\n- iavf: Fix incorrect adapter get in iavf_resume (git-fixes).\n- iavf: use generic power management (git-fixes).\n- ibmvfc: Avoid move login if fast fail is enabled (bsc#1185938 ltc#192043).\n- ibmvfc: Handle move login failure (bsc#1185938 ltc#192043).\n- ibmvfc: Reinit target retries (bsc#1185938 ltc#192043).\n- ibmvnic: add comments for spinlock_t definitions (bsc#1183871 ltc#192139).\n- ibmvnic: avoid calling napi_disable() twice (bsc#1065729).\n- ibmvnic: avoid multiple line dereference (bsc#1183871 ltc#192139).\n- ibmvnic: clean up the remaining debugfs data structures (bsc#1065729).\n- ibmvnic: correctly use dev_consume/free_skb_irq (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290 git-fixes).\n- ibmvnic: fix block comments (bsc#1183871 ltc#192139).\n- ibmvnic: fix braces (bsc#1183871 ltc#192139).\n- ibmvnic: fix miscellaneous checks (bsc#1183871 ltc#192139).\n- ibmvnic: improve failover sysfs entry (bsc#1043990 ltc#155681 git-fixes).\n- ibmvnic: merge do_change_param_reset into do_reset (bsc#1183871 ltc#192139).\n- ibmvnic: prefer \u0027unsigned long\u0027 over \u0027unsigned long int\u0027 (bsc#1183871 ltc#192139).\n- ibmvnic: prefer strscpy over strlcpy (bsc#1183871 ltc#192139).\n- ibmvnic: print adapter state as a string (bsc#1152457 ltc#174432 git-fixes).\n- ibmvnic: print reset reason as a string (bsc#1152457 ltc#174432 git-fixes).\n- ibmvnic: queue reset work in system_long_wq (bsc#1152457 ltc#174432 git-fixes).\n- ibmvnic: remove default label from to_string switch (bsc#1152457 ltc#174432 git-fixes).\n- ibmvnic: remove duplicate napi_schedule call in do_reset function (bsc#1065729).\n- ibmvnic: remove duplicate napi_schedule call in open function (bsc#1065729).\n- ibmvnic: remove unnecessary rmb() inside ibmvnic_poll (bsc#1183871 ltc#192139).\n- ibmvnic: remove unused spinlock_t stats_lock definition (bsc#1183871 ltc#192139).\n- ibmvnic: rework to ensure SCRQ entry reads are properly ordered (bsc#1183871 ltc#192139).\n- ice: Account for port VLAN in VF max packet size calculation (git-fixes).\n- ice: Account for port VLAN in VF max packet size calculation (git-fixes).\n- ice: Cleanup fltr list in case of allocation issues (git-fixes).\n- ice: Continue probe on link/PHY errors (jsc#SLE-12878).\n- ice: Fix for dereference of NULL pointer (git-fixes).\n- ice: Increase control queue timeout (git-fixes).\n- ice: Use port number instead of PF ID for WoL (jsc#SLE-12878).\n- ice: fix memory allocation call (jsc#SLE-12878).\n- ice: fix memory leak if register_netdev_fails (git-fixes).\n- ice: fix memory leak in ice_vsi_setup (git-fixes).\n- ice: fix memory leak of aRFS after resuming from suspend (jsc#SLE-12878).\n- ice: prevent ice_open and ice_stop during reset (git-fixes).\n- ice: remove DCBNL_DEVRESET bit from PF state (jsc#SLE-7926).\n- ics932s401: fix broken handling of errors when word reading fails (git-fixes).\n- igb: Fix duplicate include guard (git-fixes).\n- igb: XDP extack message on error (jsc#SLE-13536).\n- igb: XDP xmit back fix error code (jsc#SLE-13536).\n- igb: avoid premature Rx buffer reuse (jsc#SLE-13536).\n- igb: avoid transmit queue timeout in xdp path (jsc#SLE-13536).\n- igb: check timestamp validity (git-fixes).\n- igb: skb add metasize for xdp (jsc#SLE-13536).\n- igb: take VLAN double header into account (jsc#SLE-13536).\n- igb: use xdp_do_flush (jsc#SLE-13536).\n- igc: Fix Pause Frame Advertising (git-fixes).\n- igc: Fix Supported Pause Frame Link Setting (git-fixes).\n- igc: Fix igc_ptp_rx_pktstamp() (bsc#1160634).\n- igc: Fix igc_ptp_rx_pktstamp() (bsc#1160634).\n- igc: reinit_locked() should be called with rtnl_lock (git-fixes).\n- igc: reinit_locked() should be called with rtnl_lock (git-fixes).\n- iio: adc: ad7949: fix wrong ADC result due to incorrect bit mask (git-fixes).\n- iio: adis16400: Fix an error code in adis16400_initial_setup() (git-fixes).\n- iio: gyro: mpu3050: Fix error handling in mpu3050_trigger_handler (git-fixes).\n- iio: gyro: mpu3050: Fix reported temperature value (git-fixes).\n- iio: hid-sensor-humidity: Fix alignment issue of timestamp channel (git-fixes).\n- iio: hid-sensor-prox: Fix scale not correct issue (git-fixes).\n- iio: hid-sensor-temperature: Fix issues of timestamp channel (git-fixes).\n- iio: proximity: pulsedlight: Fix rumtime PM imbalance on error (git-fixes).\n- iio: tsl2583: Fix division by a zero lux_val (git-fixes).\n- iio:accel:adis16201: Fix wrong axis assignment that prevents loading (git-fixes).\n- iio:adc:qcom-spmi-vadc: add default scale to LR_MUX2_BAT_ID channel (git-fixes).\n- ima: Free IMA measurement buffer after kexec syscall (git-fixes).\n- include/linux/sched/mm.h: use rcu_dereference in in_vfork() (git-fixes).\n- intel_th: Consistency and off-by-one fix (git-fixes).\n- intel_th: pci: Add Alder Lake-M support (git-fixes).\n- intel_th: pci: Add Rocket Lake CPU support (git-fixes).\n- interconnect: core: fix error return code of icc_link_destroy() (git-fixes).\n- iommu/amd: Add support for map/unmap_resource (jsc#ECO-3482).\n- iommu/amd: Fix sleeping in atomic in increase_address_space() (bsc#1183277).\n- iommu/amd: Fix sleeping in atomic in increase_address_space() (bsc#1183310).\n- iommu/intel: Fix memleak in intel_irq_remapping_alloc (bsc#1183278).\n- iommu/intel: Fix memleak in intel_irq_remapping_alloc (bsc#1183312).\n- iommu/qcom: add missing put_device() call in qcom_iommu_of_xlate() (bsc#1183313).\n- iommu/qcom: add missing put_device() call in qcom_iommu_of_xlate() (bsc#1183637).\n- iommu/vt-d: Add get_domain_info() helper (bsc#1183279).\n- iommu/vt-d: Avoid panic if iommu init fails in tboot system (bsc#1183280).\n- iommu/vt-d: Avoid panic if iommu init fails in tboot system (bsc#1183315).\n- iommu/vt-d: Correctly check addr alignment in qi_flush_dev_iotlb_pasid() (bsc#1183281).\n- iommu/vt-d: Correctly check addr alignment in qi_flush_dev_iotlb_pasid() (bsc#1183316).\n- iommu/vt-d: Do not use flush-queue when caching-mode is on (bsc#1183282).\n- iommu/vt-d: Do not use flush-queue when caching-mode is on (bsc#1183317).\n- iommu/vt-d: Fix general protection fault in aux_detach_device() (bsc#1183283).\n- iommu/vt-d: Fix general protection fault in aux_detach_device() (bsc#1183318).\n- iommu/vt-d: Fix ineffective devTLB invalidation for subdevices (bsc#1183284).\n- iommu/vt-d: Fix ineffective devTLB invalidation for subdevices (bsc#1183319).\n- iommu/vt-d: Fix status code for Allocate/Free PASID command (bsc#1183320).\n- iommu/vt-d: Fix unaligned addresses for intel_flush_svm_range_dev() (bsc#1183285).\n- iommu/vt-d: Fix unaligned addresses for intel_flush_svm_range_dev() (bsc#1183321).\n- iommu/vt-d: Move intel_iommu info from struct intel_svm to struct intel_svm_dev (bsc#1183286).\n- iommu/vt-d: Move intel_iommu info from struct intel_svm to struct intel_svm_dev (bsc#1183322).\n- iommu/vt-d: Use device numa domain if RHSA is missing (bsc#1184585).\n- iommu: Check dev-\u003eiommu in dev_iommu_priv_get() before dereferencing it (bsc#1183311).\n- iommu: Switch gather-\u003eend to the inclusive end (bsc#1183314).\n- ionic: linearize tso skb with too many frags (bsc#1167773).\n- ionic: linearize tso skb with too many frags (bsc#1167773).\n- iopoll: introduce read_poll_timeout macro (git-fixes).\n- ipc/mqueue, msg, sem: Avoid relying on a stack reference past its expiry (bsc#1185988).\n- ipmi/watchdog: Stop watchdog timer when the current action is \u0027none\u0027 (bsc#1184855).\n- ipw2x00: potential buffer overflow in libipw_wx_set_encodeext() (git-fixes).\n- irqchip/ls-extirq: Add LS1043A, LS1088A external interrupt support (bsc#1184264).\n- irqchip/ls-extirq: Add LS1043A, LS1088A external interrupt support (bsc#1185233).\n- irqchip/ls-extirq: add IRQCHIP_SKIP_SET_WAKE to the irqchip flags (bsc#1184264).\n- irqchip/ls-extirq: add IRQCHIP_SKIP_SET_WAKE to the irqchip flags (bsc#1185233).\n- irqchip: Add support for Layerscape external interrupt lines (bsc#1185233).\n- isofs: release buffer head before return (bsc#1182613).\n- iwlwifi: add support for Qu with AX201 device (git-fixes).\n- iwlwifi: pcie: make cfg vs. trans_cfg more robust (git-fixes).\n- ixgbe: fail to create xfrm offload of IPsec tunnel mode SA (git-fixes).\n- ixgbe: fix unbalanced device enable/disable in suspend/resume (jsc#SLE-13706).\n- jffs2: fix use after free in jffs2_sum_write_data() (bsc#1184740).\n- kABI: Fix kABI caused by fixes for bsc#1174426 (bsc#1174426).\n- kABI: cover up change in struct kvm_arch (bsc#1184969).\n- kABI: powerpc/pmem: Include pmem prototypes (bsc#1113295 git-fixes).\n- kABI: powerpc/pseries: Add shutdown() to vio_driver and vio_bus (bsc#1184209 ltc#190917).\n- kbuild: Fail if gold linker is detected (bcs#1181862).\n- kbuild: add dummy toolchains to enable all cc-option etc. in Kconfig (bcs#1181862).\n- kbuild: change *FLAGS_\u0026lt;basetarget\u003e.o to take the path relative to $(obj) (bcs#1181862).\n- kbuild: dummy-tools, fix inverted tests for gcc (bcs#1181862).\n- kbuild: dummy-tools, support MPROFILE_KERNEL checks for ppc (bsc#1181862).\n- kbuild: improve cc-option to clean up all temporary files (bsc#1178330).\n- kbuild: include scripts/Makefile.* only when relevant CONFIG is enabled (bcs#1181862).\n- kbuild: simplify GCC_PLUGINS enablement in dummy-tools/gcc (bcs#1181862).\n- kbuild: stop filtering out $(GCC_PLUGINS_CFLAGS) from cc-option base (bcs#1181862).\n- kbuild: use -S instead of -E for precise cc-option test in Kconfig (bsc#1178330).\n- kconfig: introduce m32-flag and m64-flag (bcs#1181862).\n- kernel-docs.spec.in: Build using an utf-8 locale. Sphinx cannot handle UTF-8 input in non-UTF-8 locale.\n- kernel/smp: make csdlock timeout depend on boot parameter (bsc#1180846).\n- kvm: svm: Update svm_xsaves_supported (jsc#SLE-13573).\n- kvm: x86: Enumerate support for CLZERO instruction (jsc#SLE-13573).\n- leds: lp5523: check return value of lp5xx_read and jump to cleanup code (git-fixes).\n- lib/syscall: fix syscall registers retrieval on 32-bit platforms (git-fixes).\n- libbpf: Add explicit padding to bpf_xdp_set_link_opts (bsc#1177028).\n- libbpf: Add explicit padding to btf_dump_emit_type_decl_opts (bsc#1177028).\n- libbpf: Clear map_info before each bpf_obj_get_info_by_fd (bsc#1155518).\n- libbpf: Fix BTF dump of pointer-to-array-of-struct (bsc#1155518).\n- libbpf: Fix INSTALL flag order (bsc#1155518).\n- libbpf: Fix bail out from \u0027ringbuf_process_ring()\u0027 on error (bsc#1177028).\n- libbpf: Fix error path in bpf_object__elf_init() (bsc#1177028).\n- libbpf: Fix signed overflow in ringbuf_process_ring (bsc#1177028).\n- libbpf: Initialize the bpf_seq_printf parameters array field by field (bsc#1177028).\n- libbpf: Only create rx and tx XDP rings when necessary (bsc#1155518).\n- libbpf: Use SOCK_CLOEXEC when opening the netlink socket (bsc#1155518).\n- libnvdimm/label: Return -ENXIO for no slot in __blk_label_update (bsc#1185269).\n- libnvdimm/namespace: Fix reaping of invalidated block-window-namespace labels (bsc#1185269).\n- libnvdimm/region: Fix nvdimm_has_flush() to handle ND_REGION_ASYNC (bsc#1184969 git-fixes).\n- libnvdimm/security: ensure sysfs poll thread woke up and fetch updated attr (git-fixes).\n- liquidio: Fix unintented sign extension of a left shift of a u16 (git-fixes).\n- locking/mutex: Fix non debug version of mutex_lock_io_nested() (git-fixes).\n- locking/qrwlock: Fix ordering in queued_write_lock_slowpath() (bsc#1185041).\n- lpfc: Decouple port_template and vport_template (bsc#185032).\n- mISDN: fix crash in fritzpci (git-fixes).\n- mac80211: Allow HE operation to be longer than expected (git-fixes).\n- mac80211: bail out if cipher schemes are invalid (git-fixes).\n- mac80211: choose first enabled channel for monitor (git-fixes).\n- mac80211: clear sta-\u003efast_rx when STA removed from 4-addr VLAN (git-fixes).\n- mac80211: clear the beacon\u0027s CRC after channel switch (git-fixes).\n- mac80211: fix TXQ AC confusion (git-fixes).\n- mac80211: fix double free in ibss_leave (git-fixes).\n- mac80211: fix rate mask reset (git-fixes).\n- macvlan: macvlan_count_rx() needs to be aware of preemption (git-fixes).\n- md-cluster: fix use-after-free issue when removing rdev (bsc#1184082).\n- md/raid1: properly indicate failure when ending a failed write request (bsc#1185680).\n- md: do not flush workqueue unconditionally in md_open (bsc#1184081).\n- md: factor out a mddev_find_locked helper from mddev_find (bsc#1184081).\n- md: md_open returns -EBUSY when entering racing area (bsc#1184081).\n- md: split mddev_find (bsc#1184081).\n- mdio: fix mdio-thunder.c dependency \u0026 build error (git-fixes).\n- media: adv7604: fix possible use-after-free in adv76xx_remove() (git-fixes).\n- media: cros-ec-cec: do not bail on device_init_wakeup failure (git-fixes).\n- media: cx23885: add more quirks for reset DMA on some AMD IOMMU (git-fixes).\n- media: drivers: media: pci: sta2x11: fix Kconfig dependency on GPIOLIB (git-fixes).\n- media: dvb-usb: fix memory leak in dvb_usb_adapter_init (git-fixes).\n- media: dvbdev: Fix memory leak in dvb_media_device_free() (git-fixes).\n- media: em28xx: fix memory leak (git-fixes).\n- media: gspca/sq905.c: fix uninitialized variable (git-fixes).\n- media: i2c: adv7511-v4l2: fix possible use-after-free in adv7511_remove() (git-fixes).\n- media: i2c: adv7842: fix possible use-after-free in adv7842_remove() (git-fixes).\n- media: i2c: tda1997: Fix possible use-after-free in tda1997x_remove() (git-fixes).\n- media: imx: capture: Return -EPIPE from __capture_legacy_try_fmt() (git-fixes).\n- media: ite-cir: check for receive overflow (git-fixes).\n- media: m88rs6000t: avoid potential out-of-bounds reads on arrays (git-fixes).\n- media: mantis: remove orphan mantis_core.c (git-fixes).\n- media: mceusb: sanity check for prescaler value (git-fixes).\n- media: media/saa7164: fix saa7164_encoder_register() memory leak bugs (git-fixes).\n- media: omap4iss: return error code when omap4iss_get() failed (git-fixes).\n- media: platform: sti: Fix runtime PM imbalance in regs_show (git-fixes).\n- media: platform: sunxi: sun6i-csi: fix error return code of sun6i_video_start_streaming() (git-fixes).\n- media: rc: compile rc-cec.c into rc-core (git-fixes).\n- media: saa7134: use sg_dma_len when building pgtable (git-fixes).\n- media: saa7146: use sg_dma_len when building pgtable (git-fixes).\n- media: staging/intel-ipu3: Fix memory leak in imu_fmt (git-fixes).\n- media: staging/intel-ipu3: Fix race condition during set_fmt (git-fixes).\n- media: staging/intel-ipu3: Fix set_fmt error handling (git-fixes).\n- media: tc358743: fix possible use-after-free in tc358743_remove() (git-fixes).\n- media: usbtv: Fix deadlock on suspend (git-fixes).\n- media: uvcvideo: Allow entities with no pads (git-fixes).\n- media: v4l2-ctrls.c: fix race condition in hdl-\u003erequests list (git-fixes).\n- media: v4l2-ctrls.c: fix shift-out-of-bounds in std_validate (git-fixes).\n- media: v4l: vsp1: Fix bru null pointer access (git-fixes).\n- media: v4l: vsp1: Fix uif null pointer access (git-fixes).\n- media: vicodec: add missing v4l2_ctrl_request_hdl_put() (git-fixes).\n- memory: gpmc: fix out of bounds read and dereference on gpmc_cs[] (git-fixes).\n- memory: mtk-smi: Fix PM usage counter unbalance in mtk_smi ops (bsc#1183325).\n- memory: pl353: fix mask of ECC page_size config register (git-fixes).\n- mfd: arizona: Fix rumtime PM imbalance on error (git-fixes).\n- mfd: intel_pmt: Fix nuisance messages and handling of disabled capabilities (git-fixes).\n- mfd: lpc_sch: Partially revert \u0027Add support for Intel Quark X1000\u0027 (git-fixes).\n- mfd: stm32-timers: Avoid clearing auto reload register (git-fixes).\n- misc/pvpanic: Export module FDT device table (git-fixes).\n- misc: eeprom_93xx46: Add quirk to support Microchip 93LC46B eeprom (git-fixes).\n- misc: fastrpc: restrict user apps from sending kernel RPC messages (git-fixes).\n- misc: lis3lv02d: Fix false-positive WARN on various HP models (git-fixes).\n- misc: vmw_vmci: explicitly initialize vmci_datagram payload (git-fixes).\n- misc: vmw_vmci: explicitly initialize vmci_notify_bm_set_msg struct (git-fixes).\n- mlxsw: spectrum_mr: Update egress RIF list before route\u0027s action (git-fixes).\n- mm, numa: fix bad pmd by atomically check for pmd_trans_huge when marking page tables prot_numa (bsc#1168777).\n- mm/rmap: fix potential pte_unmap on an not mapped pte (git-fixes).\n- mm: hugetlbfs: fix cannot migrate the fallocated HugeTLB page (git-fixes).\n- mm: memcontrol: fix cpuhotplug statistics flushing (bsc#1185606).\n- mmc: block: Update ext_csd.cache_ctrl if it was written (git-fixes).\n- mmc: core: Correct descriptions in mmc_of_parse() (git-fixes).\n- mmc: core: Do a power cycle when the CMD11 fails (git-fixes).\n- mmc: core: Fix partition switch time for eMMC (git-fixes).\n- mmc: core: Set read only for SD cards with permanent write protect bit (git-fixes).\n- mmc: cqhci: Add cqhci_deactivate() (git-fixes).\n- mmc: cqhci: Fix random crash when remove mmc module/card (git-fixes).\n- mmc: mmc_spi: Drop unused NO_IRQ definition (git-fixes).\n- mmc: mxs-mmc: Fix a resource leak in an error handling path in \u0027mxs_mmc_probe()\u0027 (git-fixes).\n- mmc: sdhci-iproc: Cap min clock frequency on BCM2711 (bsc#1186009)\n- mmc: sdhci-iproc: Set SDHCI_QUIRK_CAP_CLOCK_BASE_BROKEN on BCM2711 (bsc#1186009)\n- mmc: sdhci-of-arasan: Add missed checks for devm_clk_register() (git-fixes).\n- mmc: sdhci-of-dwcmshc: fix rpmb access (git-fixes).\n- mmc: sdhci-of-dwcmshc: implement specific set_uhs_signaling (git-fixes).\n- mmc: sdhci-of-dwcmshc: set SDHCI_QUIRK2_PRESET_VALUE_BROKEN (git-fixes).\n- mmc: sdhci-of-esdhc: make sure delay chain locked for HS400 (git-fixes).\n- mmc: sdhci-of-esdhc: set timeout to max before tuning (git-fixes).\n- mmc: sdhci-pci-gli: increase 1.8V regulator wait (git-fixes).\n- mmc: sdhci-pci: Add PCI IDs for Intel LKF (git-fixes).\n- mmc: sdhci-pci: Fix SDHCI_RESET_ALL for CQHCI for Intel GLK-based controllers (git-fixes).\n- mmc: sdhci-pci: Fix initialization of some SD cards for Intel BYT-based controllers (git-fixes).\n- mmc: sdhci: Check for reset prior to DMA address unmap (git-fixes).\n- mmc: sdhci: Use Auto CMD Auto Select only when v4_mode is true (git-fixes).\n- mmc: uniphier-sd: Fix a resource leak in the remove function (git-fixes).\n- mmc: uniphier-sd: Fix an error handling path in uniphier_sd_probe() (git-fixes).\n- mount: fix mounting of detached mounts onto targets that reside on shared mounts (git-fixes).\n- mt7601u: fix always true expression (git-fixes).\n- mt76: dma: do not report truncated frames to mac80211 (git-fixes).\n- mt76: mt7615: fix entering driver-own state on mt7663 (git-fixes).\n- mt76: mt7615: support loading EEPROM for MT7613BE (git-fixes).\n- mt76: mt76x0: disable GTK offloading (git-fixes).\n- mt76: mt7915: fix aggr len debugfs node (git-fixes).\n- mt76: mt7915: fix txpower init for TSSI off chips (git-fixes).\n- mtd: Handle possible -EPROBE_DEFER from parse_mtd_partitions() (git-fixes).\n- mtd: rawnand: atmel: Update ecc_stats.corrected counter (git-fixes).\n- mtd: rawnand: brcmnand: fix OOB R/W with Hamming ECC (git-fixes).\n- mtd: rawnand: fsmc: Fix error code in fsmc_nand_probe() (git-fixes).\n- mtd: rawnand: gpmi: Fix a double free in gpmi_nand_init (git-fixes).\n- mtd: rawnand: qcom: Return actual error code instead of -ENODEV (git-fixes).\n- mtd: require write permissions for locking and badblock ioctls (git-fixes).\n- mtd: spi-nor: Rename \u0027n25q512a\u0027 to \u0027mt25qu512a (n25q512a)\u0027 (bsc#1167260).\n- mtd: spi-nor: Split mt25qu512a (n25q512a) entry into two (bsc#1167260).\n- mtd: spinand: core: add missing MODULE_DEVICE_TABLE() (git-fixes).\n- mwifiex: pcie: skip cancel_work_sync() on reset failure path (git-fixes).\n- nbd: fix a block_device refcount leak in nbd_release (git-fixes).\n- net, xdp: Update pkt_type if generic XDP changes unicast MAC (git-fixes).\n- net/mlx4_core: Add missed mlx4_free_cmd_mailbox() (git-fixes).\n- net/mlx4_en: update moderation when config reset (git-fixes).\n- net/mlx5: Add back multicast stats for uplink representor (jsc#SLE-15172).\n- net/mlx5: Delete extra dump stack that gives nothing (git-fixes).\n- net/mlx5: Do not request more than supported EQs (git-fixes).\n- net/mlx5: Fix PPLM register mapping (jsc#SLE-8464).\n- net/mlx5: Fix bit-wise and with zero (jsc#SLE-15172).\n- net/mlx5: Fix health error state handling (bsc#1186467).\n- net/mlx5e: Allow to match on MPLS parameters only for MPLS over UDP (jsc#SLE-15172).\n- net/mlx5e: Do not match on Geneve options in case option masks are all zero (git-fixes).\n- net/mlx5e: E-switch, Fix rate calculation division (jsc#SLE-8464).\n- net/mlx5e: Fix error path for ethtool set-priv-flag (git-fixes).\n- net/mlx5e: Fix ethtool indication of connector type (git-fixes).\n- net/mlx5e: Fix setting of RS FEC mode (jsc#SLE-15172).\n- net/mlx5e: Offload tuple rewrite for non-CT flows (jsc#SLE-15172).\n- net/mlx5e: RX, Mind the MPWQE gaps when calculating offsets (jsc#SLE-15172).\n- net/mlx5e: fix ingress_ifindex check in mlx5e_flower_parse_meta (jsc#SLE-8464).\n- net/qlcnic: Fix a use after free in qlcnic_83xx_get_minidump_template (git-fixes).\n- net/sched: act_ct: fix wild memory access when clearing fragments (bsc#1176447).\n- net: arc_emac: Fix memleak in arc_mdio_probe (git-fixes).\n- net: atheros: switch from \u0027pci_\u0027 to \u0027dma_\u0027 API (git-fixes).\n- net: atlantic: fix out of range usage of active_vlans array (git-fixes).\n- net: atlantic: fix potential error handling (git-fixes).\n- net: atlantic: fix use after free kasan warn (git-fixes).\n- net: b44: fix error return code in b44_init_one() (git-fixes).\n- net: bonding: fix error return code of bond_neigh_init() (bsc#1154353).\n- net: cdc-phonet: fix data-interface release on probe failure (git-fixes).\n- net: cls_api: Fix uninitialised struct field bo-\u003eunlocked_driver_cb (bsc#1176447).\n- net: dsa: felix: implement port flushing on .phylink_mac_link_down (git-fixes).\n- net: dsa: rtl8366: Fix VLAN semantics (git-fixes).\n- net: dsa: rtl8366: Fix VLAN set-up (git-fixes).\n- net: dsa: rtl8366rb: Support all 4096 VLANs (git-fixes).\n- net: enetc: allow hardware timestamping on TX queues with tc-etf enabled (git-fixes).\n- net: enetc: do not disable VLAN filtering in IFF_PROMISC mode (git-fixes).\n- net: enetc: fix link error again (git-fixes).\n- net: enetc: remove bogus write to SIRXIDR from enetc_setup_rxbdr (git-fixes).\n- net: enetc: take the MDIO lock only once per NAPI poll cycle (git-fixes).\n- net: enic: Cure the enic api locking trainwreck (git-fixes).\n- net: ethernet: aquantia: Fix wrong return value (git-fixes).\n- net: ethernet: cavium: octeon_mgmt: use phy_start and phy_stop (git-fixes).\n- net: ethernet: ibm: ibmvnic: Fix some kernel-doc misdemeanours (bsc#1183871 ltc#192139).\n- net: ethernet: ti: cpsw: fix clean up of vlan mc entries for host port (git-fixes).\n- net: ethernet: ti: cpsw: fix error return code in cpsw_probe() (git-fixes).\n- net: fec: Fix PHY init after phy_reset_after_clk_enable() (git-fixes).\n- net: fec: Fix phy_device lookup for phy_reset_after_clk_enable() (git-fixes).\n- net: fec: Fix reference count leak in fec series ops (git-fixes).\n- net: gemini: Fix another missing clk_disable_unprepare() in probe (git-fixes).\n- net: gemini: Fix missing free_netdev() in error path of gemini_ethernet_port_probe() (git-fixes).\n- net: geneve: check skb is large enough for IPv4/IPv6 header (git-fixes).\n- net: geneve: modify IP header check in geneve6_xmit_skb and geneve_xmit_skb (git-fixes).\n- net: gianfar: Add of_node_put() before goto statement (git-fixes).\n- net: hdlc: In hdlc_rcv, check to make sure dev is an HDLC device (git-fixes).\n- net: hdlc_raw_eth: Clear the IFF_TX_SKB_SHARING flag after calling ether_setup (git-fixes).\n- net: hns3: Fix for geneve tx checksum bug (git-fixes).\n- net: hns3: Remove the left over redundant check \u0026 assignment (bsc#1154353).\n- net: hns3: Remove un-necessary \u0027else-if\u0027 in the hclge_reset_event() (git-fixes).\n- net: hns3: add check for HNS3_NIC_STATE_INITED in hns3_reset_notify_up_enet() (git-fixes).\n- net: hns3: clear VF down state bit before request link status (git-fixes).\n- net: hns3: clear unnecessary reset request in hclge_reset_rebuild (git-fixes).\n- net: hns3: disable phy loopback setting in hclge_mac_start_phy (git-fixes).\n- net: hns3: fix bug when calculating the TCAM table info (git-fixes).\n- net: hns3: fix for vxlan gpe tx checksum bug (git-fixes).\n- net: hns3: fix incorrect configuration for igu_egu_hw_err (git-fixes).\n- net: hns3: fix query vlan mask value error for flow director (git-fixes).\n- net: hns3: initialize the message content in hclge_get_link_mode() (git-fixes).\n- net: hns3: use netif_tx_disable to stop the transmit queue (git-fixes).\n- net: korina: cast KSEG0 address to pointer in kfree (git-fixes).\n- net: korina: fix kfree of rx/tx descriptor array (git-fixes).\n- net: lantiq: Wait for the GPHY firmware to be ready (git-fixes).\n- net: ll_temac: Add more error handling of dma_map_single() calls (git-fixes).\n- net: ll_temac: Fix RX buffer descriptor handling on GFP_ATOMIC pressure (git-fixes).\n- net: ll_temac: Fix race condition causing TX hang (git-fixes).\n- net: ll_temac: Handle DMA halt condition caused by buffer underrun (git-fixes).\n- net: mvneta: fix double free of txq-\u003ebuf (git-fixes).\n- net: mvneta: make tx buffer array agnostic (git-fixes).\n- net: pasemi: fix error return code in pasemi_mac_open() (git-fixes).\n- net: phy: broadcom: Only advertise EEE for supported modes (git-fixes).\n- net: phy: intel-xway: enable integrated led functions (git-fixes).\n- net: phy: marvell: fix m88e1011_set_downshift (git-fixes).\n- net: phy: marvell: fix m88e1111_set_downshift (git-fixes).\n- net: qcom/emac: add missed clk_disable_unprepare in error path of emac_clks_phase1_init (git-fixes).\n- net: qualcomm: rmnet: Fix incorrect receive packet handling during cleanup (git-fixes).\n- net: sched: disable TCQ_F_NOLOCK for pfifo_fast (bsc#1183405)\n- net: smc911x: Adjust indentation in smc911x_phy_configure (git-fixes).\n- net: spider_net: Fix the size used in a \u0027dma_free_coherent()\u0027 call (git-fixes).\n- net: stmmac: Fix incorrect location to set real_num_rx|tx_queues (git-fixes).\n- net: stmmac: Use rtnl_lock/unlock on netif_set_real_num_rx_queues() call (git-fixes).\n- net: stmmac: fix missing IFF_MULTICAST check in dwmac4_set_filter (git-fixes).\n- net: stmmac: removed enabling eee in EEE set callback (git-fixes).\n- net: stmmac: use netif_tx_start|stop_all_queues() function (git-fixes).\n- net: stmmac: xgmac: fix missing IFF_MULTICAST checki in dwxgmac2_set_filter (git-fixes).\n- net: thunderx: Fix unintentional sign extension issue (git-fixes).\n- net: tulip: Adjust indentation in {dmfe, uli526x}_init_module (git-fixes).\n- net: usb: ax88179_178a: fix missing stop entry in driver_info (git-fixes).\n- net: usb: qmi_wwan: allow qmimux add/del with master up (git-fixes).\n- net: usb: qmi_wwan: support ZTE P685M modem (git-fixes).\n- net: wan/lmc: unregister device when no matching device is found (git-fixes).\n- net:nfc:digital: Fix a double free in digital_tg_recv_dep_req (git-fixes).\n- netdevice: Add missing IFF_PHONY_HEADROOM self-definition (git-fixes).\n- netdevsim: init u64 stats for 32bit hardware (git-fixes).\n- netfilter: conntrack: Make global sysctls readonly in non-init netns (bsc#1176447).\n- netfilter: conntrack: add new sysctl to disable RST check (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: avoid misleading \u0027invalid\u0027 in log message (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: improve RST handling when tuple is re-used (bsc#1183947 bsc#1185950).\n- netfilter: flowtable: Make sure GC works periodically in idle system (bsc#1176447).\n- netfilter: flowtable: fix NAT IPv6 offload mangling (bsc#1176447).\n- netfilter: nftables: allow to update flowtable flags (bsc#1176447).\n- netfilter: nftables: report EOPNOTSUPP on unsupported flowtable flags (bsc#1176447).\n- netsec: restore phy power state after controller reset (bsc#1183757).\n- nfc: pn533: prevent potential memory corruption (git-fixes).\n- nfp: devlink: initialize the devlink port attribute \u0027lanes\u0027 (bsc#1176447).\n- nfp: flower: add ipv6 bit to pre_tunnel control message (bsc#1176447).\n- nfp: flower: fix pre_tun mask id allocation (bsc#1154353).\n- nfp: flower: ignore duplicate merge hints from FW (git-fixes).\n- node: fix device cleanups in error handling code (git-fixes).\n- null_blk: fix passing of REQ_FUA flag in null_handle_rq (git-fixes).\n- nvme-core: add cancel tagset helpers (bsc#1183976).\n- nvme-fabrics: decode host pathing error for connect (bsc#1179827).\n- nvme-fabrics: fix kato initialization (bsc#1182591).\n- nvme-fabrics: only reserve a single tag (bsc#1182077).\n- nvme-fabrics: reject I/O to offline device (bsc#1181161).\n- nvme-fc: check sgl supported by target (bsc#1179827).\n- nvme-fc: clear q_live at beginning of association teardown (bsc#1186479).\n- nvme-fc: fix racing controller reset and create association (bsc#1183048).\n- nvme-fc: return NVME_SC_HOST_ABORTED_CMD when a command has been aborted (bsc#1180197).\n- nvme-fc: return NVME_SC_HOST_ABORTED_CMD when a command has been aborted (bsc#1184259).\n- nvme-fc: set NVME_REQ_CANCELLED in nvme_fc_terminate_exchange() (bsc#1180197).\n- nvme-fc: set NVME_REQ_CANCELLED in nvme_fc_terminate_exchange() (bsc#1184259).\n- nvme-fc: short-circuit reconnect retries (bsc#1179827).\n- nvme-hwmon: Return error code when registration fails (bsc#1177326).\n- nvme-hwmon: Return error code when registration fails (bsc#1177326).\n- nvme-multipath: fix double initialization of ANA state (bsc#1178612, bsc#1184259).\n- nvme-multipath: reset bdev to ns head when failover (bsc#178378 bsc#1182999). \n- nvme-tcp: Fix possible race of io_work and direct send (git-fixes).\n- nvme-tcp: Fix warning with CONFIG_DEBUG_PREEMPT (git-fixes).\n- nvme-tcp: add clean action for failed reconnection (bsc#1183976).\n- nvme-tcp: fix kconfig dependency warning when !CRYPTO (git-fixes).\n- nvme-tcp: fix misuse of __smp_processor_id with preemption (git-fixes).\n- nvme-tcp: fix possible hang waiting for icresp response (bsc#1179519).\n- nvme-tcp: fix possible hang when failing to set io queues (bsc#1181161).\n- nvme-tcp: use cancel tagset helper for tear down (bsc#1183976).\n- nvme: Fix NULL dereference for pci nvme controllers (bsc#1182378).\n- nvme: add \u0027kato\u0027 sysfs attribute (bsc#1179825).\n- nvme: add NVME_REQ_CANCELLED flag in nvme_cancel_request() (bsc#1180197).\n- nvme: add NVME_REQ_CANCELLED flag in nvme_cancel_request() (bsc#1184259).\n- nvme: allocate the keep alive request using BLK_MQ_REQ_NOWAIT (bsc#1182077).\n- nvme: call nvme_identify_ns as the first thing in nvme_alloc_ns_block (bsc#1180197).\n- nvme: clean up the check for too large logic block sizes (bsc#1180197).\n- nvme: define constants for identification values (git-fixes).\n- nvme: do not intialize hwmon for discovery controllers (bsc#1184259).\n- nvme: do not intialize hwmon for discovery controllers (git-fixes).\n- nvme: explicitly update mpath disk capacity on revalidation (git-fixes).\n- nvme: expose reconnect_delay and ctrl_loss_tmo via sysfs (bsc#1182378).\n- nvme: factor out a nvme_configure_metadata helper (bsc#1180197).\n- nvme: fix controller instance leak (git-fixes).\n- nvme: fix initialization of the zone bitmaps (bsc#1180197).\n- nvme: fix possible deadlock when I/O is blocked (git-fixes).\n- nvme: freeze the queue over -\u003elba_shift updates (bsc#1180197).\n- nvme: lift the check for an unallocated namespace into nvme_identify_ns (bsc#1180197).\n- nvme: merge nvme_keep_alive into nvme_keep_alive_work (bsc#1182077).\n- nvme: move nvme_validate_ns (bsc#1180197).\n- nvme: opencode revalidate_disk in nvme_validate_ns (bsc#1180197).\n- nvme: query namespace identifiers before adding the namespace (bsc#1180197).\n- nvme: refactor nvme_validate_ns (bsc#1180197).\n- nvme: remove nvme_identify_ns_list (bsc#1180197).\n- nvme: remove nvme_update_formats (bsc#1180197).\n- nvme: remove superfluous else in nvme_ctrl_loss_tmo_store (bsc#1182378).\n- nvme: remove the 0 lba_shift check in nvme_update_ns_info (bsc#1180197).\n- nvme: remove the disk argument to nvme_update_zone_info (bsc#1180197).\n- nvme: rename __nvme_revalidate_disk (bsc#1180197).\n- nvme: rename _nvme_revalidate_disk (bsc#1180197).\n- nvme: rename nvme_validate_ns to nvme_validate_or_alloc_ns (bsc#1180197).\n- nvme: retrigger ANA log update if group descriptor isn\u0027t found (git-fixes)\n- nvme: return an error if nvme_set_queue_count() fails (bsc#1180197).\n- nvme: revalidate zone bitmaps in nvme_update_ns_info (bsc#1180197).\n- nvme: sanitize KATO setting (bsc#1179825).\n- nvme: set the queue limits in nvme_update_ns_info (bsc#1180197).\n- nvme: simplify error logic in nvme_validate_ns() (bsc#1180197).\n- nvme: simplify error logic in nvme_validate_ns() (bsc#1184259).\n- nvme: update the known admin effects (bsc#1180197).\n- nvmet-rdma: Fix list_del corruption on queue establishment failure (bsc#1183501).\n- nvmet: fix a memory leak (git-fixes).\n- nvmet: seset ns-\u003efile when open fails (bsc#1183873).\n- nvmet: use new ana_log_size instead the old one (bsc#1184259).\n- ocfs2: fix a use after free on error (bsc#1184738).\n- ovl: fix dentry leak in ovl_get_redirect (bsc#1184176).\n- ovl: fix out of date comment and unreachable code (bsc#1184176).\n- ovl: fix regression with re-formatted lower squashfs (bsc#1184176).\n- ovl: fix unneeded call to ovl_change_flags() (bsc#1184176).\n- ovl: fix value of i_ino for lower hardlink corner case (bsc#1184176).\n- ovl: initialize error in ovl_copy_xattr (bsc#1184176).\n- ovl: relax WARN_ON() when decoding lower directory file handle (bsc#1184176).\n- pata_arasan_cf: fix IRQ check (git-fixes).\n- pata_ipx4xx_cf: fix IRQ check (git-fixes).\n- perf/amd/uncore: Fix sysfs type mismatch (bsc#1178134).\n- phy: marvell: ARMADA375_USBCLUSTER_PHY should not default to y, unconditionally (git-fixes).\n- phy: phy-twl4030-usb: Fix possible use-after-free in twl4030_usb_remove() (git-fixes).\n- partitions/ibm: fix non-DASD devices (bsc#1185857 LTC#192526).\n- pinctrl: Ingenic: Add missing pins to the JZ4770 MAC MII group (git-fixes).\n- pinctrl: core: Fix kernel doc string for pin_get_name() (git-fixes).\n- pinctrl: ingenic: Improve unreachable code generation (git-fixes).\n- pinctrl: lewisburg: Update number of pins in community (git-fixes).\n- pinctrl: qcom: spmi-gpio: fix warning about irq chip reusage (git-fixes).\n- pinctrl: rockchip: fix restore error in resume (git-fixes).\n- pinctrl: samsung: use \u0027int\u0027 for register masks in Exynos (git-fixes).\n- platform/mellanox: mlxbf-tmfifo: Fix a memory barrier issue (git-fixes).\n- platform/x86: acer-wmi: Add ACER_CAP_KBD_DOCK quirk for the Aspire Switch 10E SW3-016 (git-fixes).\n- platform/x86: acer-wmi: Add ACER_CAP_SET_FUNCTION_MODE capability flag (git-fixes).\n- platform/x86: acer-wmi: Add new force_caps module parameter (git-fixes).\n- platform/x86: acer-wmi: Add support for SW_TABLET_MODE on Switch devices (git-fixes).\n- platform/x86: acer-wmi: Cleanup ACER_CAP_FOO defines (git-fixes).\n- platform/x86: acer-wmi: Cleanup accelerometer device handling (git-fixes).\n- platform/x86: intel-hid: Support Lenovo ThinkPad X1 Tablet Gen 2 (git-fixes).\n- platform/x86: intel-vbtn: Stop reporting SW_DOCK events (git-fixes).\n- platform/x86: intel_int0002_vgpio: Only call enable_irq_wake() when using s2idle (git-fixes).\n- platform/x86: intel_pmc_core: Do not use global pmcdev in quirks (git-fixes).\n- platform/x86: intel_pmt_crashlog: Fix incorrect macros (git-fixes).\n- platform/x86: pmc_atom: Match all Beckhoff Automation baytrail boards with critclk_systems DMI table (git-fixes).\n- platform/x86: thinkpad_acpi: Allow the FnLock LED to change state (git-fixes).\n- platform/x86: thinkpad_acpi: Correct thermal sensor allocation (git-fixes).\n- posix-timers: Preserve return value in clock_adjtime32() (git-fixes)\n- post.sh: Return an error when module update fails (bsc#1047233 bsc#1184388).\n- power: supply: Use IRQF_ONESHOT (git-fixes).\n- power: supply: generic-adc-battery: fix possible use-after-free in gab_remove() (git-fixes).\n- power: supply: s3c_adc_battery: fix possible use-after-free in s3c_adc_bat_remove() (git-fixes).\n- powerepc/book3s64/hash: Align start/end address correctly with bolt mapping (bsc#1184957).\n- powerpc/64s/exception: Clean up a missed SRR specifier (jsc#SLE-9246 git-fixes).\n- powerpc/64s: Fix crashes when toggling entry flush barrier (bsc#1177666 git-fixes).\n- powerpc/64s: Fix crashes when toggling stf barrier (bsc#1087082 git-fixes).\n- powerpc/64s: Fix instruction encoding for lis in ppc_function_entry() (bsc#1065729).\n- powerpc/64s: Fix pte update for kernel memory on radix (bsc#1055117 git-fixes).\n- powerpc/asm-offsets: GPR14 is not needed either (bsc#1065729).\n- powerpc/book3s64/radix: Remove WARN_ON in destroy_context() (bsc#1183692 ltc#191963).\n- powerpc/eeh: Fix EEH handling for hugepages in ioremap space (bsc#1156395).\n- powerpc/fadump: Mark fadump_calculate_reserve_size as __init (bsc#1065729).\n- powerpc/kexec_file: Use current CPU info while setting up FDT (bsc#1184615 ltc#189835).\n- powerpc/kuap: Restore AMR after replaying soft interrupts (bsc#1156395).\n- powerpc/mm: Add cond_resched() while removing hpte mappings (bsc#1183289 ltc#191637).\n- powerpc/papr_scm: Fix build error due to wrong printf specifier (bsc#1184969).\n- powerpc/papr_scm: Implement support for H_SCM_FLUSH hcall (bsc#1184969).\n- powerpc/perf: Fix PMU constraint check for EBB events (bsc#1065729).\n- powerpc/perf: Fix sampled instruction type for larx/stcx (jsc#SLE-13513).\n- powerpc/perf: Fix the threshold event selection for memory events in power10 (jsc#SLE-13513).\n- powerpc/pmem: Include pmem prototypes (bsc#1113295 git-fixes).\n- powerpc/prom: Mark identical_pvr_fixup as __init (bsc#1065729).\n- powerpc/pseries/mobility: handle premature return from H_JOIN (bsc#1181674 ltc#189159 git-fixes bsc#1183662 ltc#191922).\n- powerpc/pseries/mobility: use struct for shared state (bsc#1181674 ltc#189159 git-fixes bsc#1183662 ltc#191922).\n- powerpc/pseries/ras: Remove unused variable \u0027status\u0027 (bsc#1065729).\n- powerpc/pseries: Add shutdown() to vio_driver and vio_bus (bsc#1184209 ltc#190917).\n- powerpc/pseries: Do not trace hcall tracing wrapper (bsc#1185110 ltc#192091).\n- powerpc/pseries: Fix hcall tracing recursion in pv queued spinlocks (bsc#1185110 ltc#192091).\n- powerpc/pseries: use notrace hcall variant for H_CEDE idle (bsc#1185110 ltc#192091).\n- powerpc/pseries: warn if recursing into the hcall tracing code (bsc#1185110 ltc#192091).\n- powerpc/smp: Reintroduce cpu_core_mask (jsc#SLE-13615 bsc#1180100 ltc#190257 git-fixes).\n- powerpc/sstep: Check instruction validity against ISA version before emulation (bsc#1156395).\n- powerpc/sstep: Check instruction validity against ISA version before emulation (bsc#1156395).\n- powerpc/sstep: Fix darn emulation (bsc#1156395).\n- powerpc/sstep: Fix incorrect return from analyze_instr() (bsc#1156395).\n- powerpc/sstep: Fix load-store and update emulation (bsc#1156395).\n- powerpc/time: Enable sched clock for irqtime (bsc#1156395).\n- powerpc/uaccess: Avoid might_fault() when user access is enabled (bsc#1156395).\n- powerpc/uaccess: Perform barrier_nospec() in KUAP allowance helpers (bsc#1156395).\n- powerpc/uaccess: Simplify unsafe_put_user() implementation (bsc#1156395).\n- powerpc/xive: Drop check on irq_data in xive_core_debug_show() (bsc#1177437 ltc#188522 jsc#SLE-13294 git-fixes).\n- powerpc/xmon: Fix build failure for 8xx (jsc#SLE-12936 git-fixes).\n- powerpc: Fix inverted SET_FULL_REGS bitop (jsc#SLE-9246 git-fixes).\n- powerpc: Fix missing declaration ofable_kernel_vsx() (git-fixes).\n- proc: fix lookup in /proc/net subdirectories after setns(2) (git-fixes).\n- qlcnic: fix error return code in qlcnic_83xx_restart_hw() (git-fixes).\n- qtnfmac: Fix possible buffer overflow in qtnf_event_handle_external_auth (git-fixes).\n- qxl: Fix uninitialised struct field head.surface_id (git-fixes).\n- r8169: do not advertise pause in jumbo mode (git-fixes).\n- r8169: fix DMA being used after buffer free if WoL is enabled (git-fixes).\n- r8169: tweak max read request size for newer chips also in jumbo mtu mode (git-fixes).\n- regmap: set debugfs_name to NULL after it is freed (git-fixes).\n- regulator: Avoid a double \u0027of_node_get\u0027 in \u0027regulator_of_get_init_node()\u0027 (git-fixes).\n- regulator: bd9571mwv: Fix AVS and DVFS voltage range (git-fixes).\n- reintroduce cqhci_suspend for kABI (git-fixes).\n- reiserfs: update reiserfs_xattrs_initialized() condition (bsc#1184737).\n- rsi: Fix TX EAPOL packet handling against iwlwifi AP (git-fixes).\n- rsi: Move card interrupt handling to RX thread (git-fixes).\n- rsi: Use resume_noirq for SDIO (git-fixes).\n- rsxx: remove extraneous \u0027const\u0027 qualifier (git-fixes).\n- rtc: ds1307: Fix wday settings for rx8130 (git-fixes).\n- rtc: fsl-ftm-alarm: add MODULE_TABLE() (bsc#1185454).\n- rtc: fsl-ftm-alarm: avoid struct rtc_time conversions (bsc#1185454).\n- rtc: fsl-ftm-alarm: enable acpi support (bsc#1185454).\n- rtc: fsl-ftm-alarm: fix freeze(s2idle) failed to wake (bsc#1185454).\n- rtc: fsl-ftm-alarm: report alarm to core (bsc#1185454).\n- rtc: fsl-ftm-alarm: switch to ktime_get_real_seconds (bsc#1185454).\n- rtc: fsl-ftm-alarm: switch to rtc_time64_to_tm/rtc_tm_to_time64 (bsc#1185454).\n- rtc: fsl-ftm-alarm: update acpi device id (bsc#1185454).\n- rtc: pcf2127: add alarm support (bsc#1185233).\n- rtc: pcf2127: add pca2129 device id (bsc#1185233).\n- rtc: pcf2127: add tamper detection support (bsc#1185233).\n- rtc: pcf2127: add watchdog feature support (bsc#1185233).\n- rtc: pcf2127: bugfix: watchdog build dependency (bsc#1185233).\n- rtc: pcf2127: cleanup register and bit defines (bsc#1185233).\n- rtc: pcf2127: convert to devm_rtc_allocate_device (bsc#1185233).\n- rtc: pcf2127: fix a bug when not specify interrupts property (bsc#1185233).\n- rtc: pcf2127: fix alarm handling (bsc#1185233).\n- rtc: pcf2127: fix pcf2127_nvmem_read/write() returns (bsc#1185233).\n- rtc: pcf2127: handle boot-enabled watchdog feature (bsc#1185233).\n- rtc: pcf2127: handle timestamp interrupts (bsc#1185495).\n- rtc: pcf2127: let the core handle rtc range (bsc#1185233).\n- rtc: pcf2127: move watchdog initialisation to a separate function (bsc#1185233).\n- rtc: pcf2127: only use watchdog when explicitly available (bsc#1185233).\n- rtc: pcf2127: properly set flag WD_CD for rtc chips(pcf2129, pca2129) (bsc#1185233).\n- rtc: pcf2127: remove unnecessary #ifdef (bsc#1185233).\n- rtc: pcf2127: set regmap max_register (bsc#1185233).\n- rtc: pcf2127: watchdog: handle nowayout feature (bsc#1185233).\n- rtlwifi: 8821ae: upgrade PHY and RF parameters (git-fixes).\n- rtw88: Fix an error code in rtw_debugfs_set_rsvd_page() (git-fixes).\n- rtw88: Fix array overrun in rtw_get_tx_power_params() (git-fixes).\n- rtw88: coex: 8821c: correct antenna switch function (git-fixes).\n- s390/cio: return -EFAULT if copy_to_user() fails (git-fixes).\n- s390/cio: return -EFAULT if copy_to_user() fails (git-fixes).\n- s390/crypto: return -EFAULT if copy_to_user() fails (git-fixes).\n- s390/dasd: fix hanging DASD driver unbind (bsc#1183932 LTC#192153).\n- s390/dasd: fix hanging IO request during DASD driver unbind (git-fixes).\n- s390/entry: save the caller of psw_idle (bsc#1185677).\n- s390/ipl: support NVMe IPL kernel parameters (bsc#1185980 LTC#192679).\n- s390/kdump: fix out-of-memory with PCI (bsc#1182257 LTC#191375).\n- s390/pci: fix leak of PCI device structure (git-fixes).\n- s390/qeth: fix memory leak after failed TX Buffer allocation (git-fixes).\n- s390/qeth: fix notification for pending buffers during teardown (git-fixes).\n- s390/qeth: improve completion of pending TX buffers (git-fixes).\n- s390/qeth: schedule TX NAPI on QAOB completion (git-fixes).\n- s390/vtime: fix increased steal time accounting (bsc#1183859).\n- s390/zcrypt: return EIO when msg retry limit reached (git-fixes).\n- samples, bpf: Add missing munmap in xdpsock (bsc#1155518).\n- samples/bpf: Fix possible hang in xdpsock with multiple threads (bsc#1155518).\n- sata_mv: add IRQ checks (git-fixes).\n- sched/eas: Do not update misfit status if the task is pinned (git-fixes)\n- sched/fair: Avoid stale CPU util_est value for schedutil in (git-fixes)\n- sched/fair: Fix shift-out-of-bounds in load_balance() (git fixes (sched)).\n- sched/fair: Fix unfairness caused by missing load decay (git-fixes)\n- scripts/git_sort/git_sort.py: add bpf git repo\n- scsi: aacraid: Improve compat_ioctl handlers (bsc#1186352).\n- scsi: block: Fix a race in the runtime power management code (git-fixes).\n- scsi: core: Only return started requests from scsi_host_find_tag() (bsc#1179851).\n- scsi: core: Run queue in case of I/O resource contention failure (bsc#1186416).\n- scsi: core: add scsi_host_busy_iter() (bsc#1179851).\n- scsi: fnic: Kill \u0027exclude_id\u0027 argument to fnic_cleanup_io() (bsc#1179851).\n- scsi: fnic: Remove bogus ratelimit messages (bsc#1183249).\n- scsi: libfc: Avoid invoking response handler twice if ep is already completed (bsc#1186573).\n- scsi: lpfc: Add a option to enable interlocked ABTS before job completion (bsc#1186451).\n- scsi: lpfc: Add ndlp kref accounting for resume RPI path (bsc#1186451).\n- scsi: lpfc: Change wording of invalid pci reset log message (bsc#1182574).\n- scsi: lpfc: Correct function header comments related to ndlp reference counting (bsc#1182574).\n- scsi: lpfc: Eliminate use of LPFC_DRIVER_NAME in lpfc_attr.c (bsc#1185472).\n- scsi: lpfc: Fix \u0027Unexpected timeout\u0027 error in direct attach topology (bsc#1186451).\n- scsi: lpfc: Fix ADISC handling that never frees nodes (bsc#1182574).\n- scsi: lpfc: Fix DMA virtual address ptr assignment in bsg (bsc#1185365).\n- scsi: lpfc: Fix FLOGI failure due to accessing a freed node (bsc#1182574).\n- scsi: lpfc: Fix NMI crash during rmmod due to circular hbalock dependency (bsc#1185472).\n- scsi: lpfc: Fix Node recovery when driver is handling simultaneous PLOGIs (bsc#1186451).\n- scsi: lpfc: Fix PLOGI ACC to be transmit after REG_LOGIN (bsc#1182574).\n- scsi: lpfc: Fix a bunch of kernel-doc issues (bsc#1185472).\n- scsi: lpfc: Fix a bunch of kernel-doc misdemeanours (bsc#1185472).\n- scsi: lpfc: Fix a bunch of misnamed functions (bsc#1185472).\n- scsi: lpfc: Fix a few incorrectly named functions (bsc#1185472).\n- scsi: lpfc: Fix a typo (bsc#1185472).\n- scsi: lpfc: Fix bad memory access during VPD DUMP mailbox command (bsc#1186451).\n- scsi: lpfc: Fix crash caused by switch reboot (bsc#1182574).\n- scsi: lpfc: Fix crash when a REG_RPI mailbox fails triggering a LOGO response (bsc#1185472).\n- scsi: lpfc: Fix crash when lpfc_sli4_hba_setup() fails to initialize the SGLs (bsc#1186451).\n- scsi: lpfc: Fix dropped FLOGI during pt2pt discovery recovery (bsc#1182574).\n- scsi: lpfc: Fix error handling for mailboxes completed in MBX_POLL mode (bsc#1185472).\n- scsi: lpfc: Fix formatting and misspelling issues (bsc#1185472).\n- scsi: lpfc: Fix gcc -Wstringop-overread warning (bsc#1185472).\n- scsi: lpfc: Fix illegal memory access on Abort IOCBs (bsc#1183203).\n- scsi: lpfc: Fix incorrect dbde assignment when building target abts wqe (bsc#1182574).\n- scsi: lpfc: Fix incorrect naming of __lpfc_update_fcf_record() (bsc#1185472).\n- scsi: lpfc: Fix incorrectly documented function lpfc_debugfs_commonxripools_data() (bsc#1185472).\n- scsi: lpfc: Fix kernel-doc formatting issue (bsc#1185472).\n- scsi: lpfc: Fix lack of device removal on port swaps with PRLIs (bsc#1185472).\n- scsi: lpfc: Fix lpfc_els_retry() possible null pointer dereference (bsc#1182574).\n- scsi: lpfc: Fix lpfc_hdw_queue attribute being ignored (bsc#1185472).\n- scsi: lpfc: Fix missing FDMI registrations after Mgmt Svc login (bsc#1185472).\n- scsi: lpfc: Fix node handling for Fabric Controller and Domain Controller (bsc#1186451).\n- scsi: lpfc: Fix nodeinfo debugfs output (bsc#1182574).\n- scsi: lpfc: Fix non-optimized ERSP handling (bsc#1186451).\n- scsi: lpfc: Fix null pointer dereference in lpfc_prep_els_iocb() (bsc#1182574).\n- scsi: lpfc: Fix pt2pt connection does not recover after LOGO (bsc#1182574).\n- scsi: lpfc: Fix pt2pt state transition causing rmmod hang (bsc#1182574).\n- scsi: lpfc: Fix reference counting errors in lpfc_cmpl_els_rsp() (bsc#1185472).\n- scsi: lpfc: Fix reftag generation sizing errors (bsc#1182574).\n- scsi: lpfc: Fix rmmod crash due to bad ring pointers to abort_iotag (bsc#1185472).\n- scsi: lpfc: Fix silent memory allocation failure in lpfc_sli4_bsg_link_diag_test() (bsc#1185472).\n- scsi: lpfc: Fix some error codes in debugfs (bsc#1185472).\n- scsi: lpfc: Fix stale node accesses on stale RRQ request (bsc#1182574).\n- scsi: lpfc: Fix status returned in lpfc_els_retry() error exit path (bsc#1182574).\n- scsi: lpfc: Fix unnecessary null check in lpfc_release_scsi_buf (bsc#1182574).\n- scsi: lpfc: Fix unreleased RPIs when NPIV ports are created (bsc#1186451).\n- scsi: lpfc: Fix use after free in lpfc_els_free_iocb (bsc#1182574).\n- scsi: lpfc: Fix use-after-free on unused nodes after port swap (bsc#1185472).\n- scsi: lpfc: Fix various trivial errors in comments and log messages (bsc#1185472).\n- scsi: lpfc: Fix vport indices in lpfc_find_vport_by_vpid() (bsc#1182574).\n- scsi: lpfc: Ignore GID-FT response that may be received after a link flip (bsc#1186451).\n- scsi: lpfc: Reduce LOG_TRACE_EVENT logging for vports (bsc#1182574).\n- scsi: lpfc: Remove unsupported mbox PORT_CAPABILITIES logic (bsc#1185472).\n- scsi: lpfc: Reregister FPIN types if ELS_RDF is received from fabric controller (bsc#1186451).\n- scsi: lpfc: Standardize discovery object logging format (bsc#1185472).\n- scsi: lpfc: Update copyrights for 12.8.0.7 and 12.8.0.8 changes (bsc#1182574).\n- scsi: lpfc: Update lpfc version to 12.8.0.10 (bsc#1186451).\n- scsi: lpfc: Update lpfc version to 12.8.0.8 (bsc#1182574).\n- scsi: lpfc: Update lpfc version to 12.8.0.9 (bsc#1185472).\n- scsi: mpt3sas: Only one vSES is present even when IOC has multi vSES (bsc#1185954).\n- scsi: pm80xx: Do not sleep in atomic context (bsc#1186353).\n- scsi: pm80xx: Fix chip initialization failure (bsc#1186354).\n- scsi: pm80xx: Fix potential infinite loop (bsc#1186354).\n- scsi: pm80xx: Increase timeout for pm80xx mpi_uninit_check() (bsc#1186355).\n- scsi: qla2xxx: Add H:C:T info in the log message for fc ports (bsc#1185491).\n- scsi: qla2xxx: Add error counters to debugfs node (bsc#1185491).\n- scsi: qla2xxx: Always check the return value of qla24xx_get_isp_stats() (bsc#1185491).\n- scsi: qla2xxx: Assign boolean values to a bool variable (bsc#1185491).\n- scsi: qla2xxx: Check kzalloc() return value (bsc#1185491).\n- scsi: qla2xxx: Consolidate zio threshold setting for both FCP \u0026 NVMe (bsc#1185491).\n- scsi: qla2xxx: Constify struct qla_tgt_func_tmpl (bsc#1185491).\n- scsi: qla2xxx: Do logout even if fabric scan retries got exhausted (bsc#1185491).\n- scsi: qla2xxx: Enable NVMe CONF (BIT_7) when enabling SLER (bsc#1185491).\n- scsi: qla2xxx: Fix IOPS drop seen in some adapters (bsc#1185491).\n- scsi: qla2xxx: Fix RISC RESET completion polling (bsc#1185491).\n- scsi: qla2xxx: Fix a couple of misdocumented functions (bsc#1185491).\n- scsi: qla2xxx: Fix a couple of misnamed functions (bsc#1185491).\n- scsi: qla2xxx: Fix broken #endif placement (bsc#1185491).\n- scsi: qla2xxx: Fix crash in PCIe error handling (bsc#1185491).\n- scsi: qla2xxx: Fix crash in qla2xxx_mqueuecommand() (bsc#1185491).\n- scsi: qla2xxx: Fix endianness annotations (bsc#1185491).\n- scsi: qla2xxx: Fix incorrectly named function qla8044_check_temp() (bsc#1185491).\n- scsi: qla2xxx: Fix mailbox Ch erroneous error (bsc#1185491).\n- scsi: qla2xxx: Fix mailbox recovery during PCIe error (bsc#1185491).\n- scsi: qla2xxx: Fix some incorrect formatting/spelling issues (bsc#1185491).\n- scsi: qla2xxx: Fix some memory corruption (bsc#1185491).\n- scsi: qla2xxx: Fix stuck session (bsc#1185491).\n- scsi: qla2xxx: Fix use after free in bsg (bsc#1185491).\n- scsi: qla2xxx: Implementation to get and manage host, target stats and initiator port (bsc#1185491).\n- scsi: qla2xxx: Move some messages from debug to normal log level (bsc#1185491).\n- scsi: qla2xxx: Remove redundant NULL check (bsc#1185491).\n- scsi: qla2xxx: Remove unnecessary NULL check (bsc#1185491).\n- scsi: qla2xxx: Remove unneeded if-null-free check (bsc#1185491).\n- scsi: qla2xxx: Replace __qla2x00_marker()\u0027s missing underscores (bsc#1185491).\n- scsi: qla2xxx: Reserve extra IRQ vectors (bsc#1184436).\n- scsi: qla2xxx: Reuse existing error handling path (bsc#1185491).\n- scsi: qla2xxx: Simplify if statement (bsc#1185491).\n- scsi: qla2xxx: Simplify qla8044_minidump_process_control() (bsc#1185491).\n- scsi: qla2xxx: Simplify the calculation of variables (bsc#1185491).\n- scsi: qla2xxx: Suppress Coverity complaints about dseg_r* (bsc#1185491).\n- scsi: qla2xxx: Update default AER debug mask (bsc#1185491).\n- scsi: qla2xxx: Update version to 10.02.00.105-k (bsc#1185491).\n- scsi: qla2xxx: Update version to 10.02.00.106-k (bsc#1185491).\n- scsi: qla2xxx: Use dma_pool_zalloc() (bsc#1185491).\n- scsi: qla2xxx: Wait for ABTS response on I/O timeouts for NVMe (bsc#1185491).\n- scsi: qla2xxx: fc_remote_port_chkready() returns a SCSI result value (bsc#1185491).\n- scsi: smartpqi: Correct driver removal with HBA disks (bsc#1178089).\n- scsi: smartpqi: Correct driver removal with HBA disks (bsc#1178089).\n- scsi: smartpqi: Correct pqi_sas_smp_handler busy condition (bsc#1178089).\n- scsi: smartpqi: Correct pqi_sas_smp_handler busy condition (bsc#1178089).\n- scsi: smartpqi: Update version to 1.2.16-012 (bsc#1178089).\n- scsi: smartpqi: Update version to 1.2.16-012 (bsc#1178089).\n- scsi: target: pscsi: Avoid OOM in pscsi_map_sg() (bsc#1183843).\n- scsi: target: pscsi: Clean up after failure in pscsi_map_sg() (bsc#1183843).\n- scsi: target: tcmu: Fix use-after-free of se_cmd-\u003epriv (bsc#1186356).\n- scsi: target: tcmu: Fix warning: \u0027page\u0027 may be used uninitialized (bsc#1186357).\n- sctp: delay auto_asconf init until binding the first addr (\u0026lt;cover.1620748346.git.mkubecek@suse.cz\u003e).\n- security: keys: trusted: fix TPM2 authorizations (git-fixes).\n- selftests/bpf: Fix BPF_CORE_READ_BITFIELD() macro (bsc#1177028).\n- selftests/bpf: Fix the ASSERT_ERR_PTR macro (bsc#1177028).\n- selftests/bpf: Mask bpf_csum_diff() return value to 16 bits in test_verifier (bsc#1155518).\n- selftests/bpf: No need to drop the packet when there is no geneve opt (bsc#1155518).\n- selftests/bpf: Re-generate vmlinux.h and BPF skeletons if bpftool changed (bsc#1177028).\n- selftests/bpf: Set gopt opt_class to 0 if get tunnel opt failed (bsc#1155518).\n- selftests/powerpc: Add pkey helpers for rights (bsc#1184934 ltc#191460).\n- selftests/powerpc: Add test for execute-disabled pkeys (bsc#1184934 ltc#191460).\n- selftests/powerpc: Add test for pkey siginfo verification (bsc#1184934 ltc#191460).\n- selftests/powerpc: Add wrapper for gettid (bsc#1184934 ltc#191460).\n- selftests/powerpc: Fix L1D flushing tests for Power10 (bsc#1184934 ltc#191460).\n- selftests/powerpc: Fix exit status of pkey tests (bsc#1184934 ltc#191460).\n- selftests/powerpc: Fix pkey syscall redefinitions (bsc#1184934 ltc#191460).\n- selftests/powerpc: Move pkey helpers to headers (bsc#1184934 ltc#191460).\n- selftests/powerpc: refactor entry and rfi_flush tests (bsc#1184934 ltc#191460).\n- selftests: mlxsw: Remove a redundant if statement in tc_flower_scale test (bsc#1176774).\n- selinux: Fix error return code in sel_ib_pkey_sid_slow() (git-fixes).\n- selinux: fix error initialization in inode_doinit_with_dentry() (git-fixes).\n- selinux: fix inode_doinit_with_dentry() LABEL_INVALID error handling (git-fixes).\n- serial: core: return early on unsupported ioctls (git-fixes).\n- serial: stm32: fix incorrect characters on console (git-fixes).\n- serial: stm32: fix tx_empty condition (git-fixes).\n- smb3: Fix out-of-bounds bug in SMB2_negotiate() (bsc#1183540).\n- smb3: add dynamic trace point to trace when credits obtained (bsc#1181507).\n- smb3: fix crediting for compounding when only one request in flight (bsc#1181507).\n- smc: disallow TCP_ULP in smc_setsockopt() (git-fixes).\n- soc/fsl: qbman: fix conflicting alignment attributes (git-fixes).\n- soc: aspeed: fix a ternary sign expansion bug (git-fixes).\n- soc: fsl: qe: replace qe_io{read,write}* wrappers by generic io{read,write}* (git-fixes).\n- soc: qcom: mdt_loader: Detect truncated read of segments (git-fixes).\n- soc: qcom: mdt_loader: Validate that p_filesz \u0026lt; p_memsz (git-fixes).\n- software node: Fix node registration (git-fixes).\n- soundwire: bus: Fix device found flag correctly (git-fixes).\n- soundwire: stream: fix memory leak in stream config error path (git-fixes).\n- spi: Introduce dspi_slave_abort() function for NXP\u0027s dspi SPI driver (bsc#1167260).\n- spi: ath79: always call chipselect function (git-fixes).\n- spi: ath79: remove spi-master setup and cleanup assignment (git-fixes).\n- spi: cadence: set cqspi to the driver_data field of struct device (git-fixes).\n- spi: dln2: Fix reference leak to master (git-fixes).\n- spi: fsl-dspi: fix NULL pointer dereference (bsc#1167260).\n- spi: fsl-dspi: fix use-after-free in remove path (bsc#1167260).\n- spi: fsl-dspi: fix wrong pointer in suspend/resume (bsc#1167260).\n- spi: fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware() (git-fixes).\n- spi: omap-100k: Fix reference leak to master (git-fixes).\n- spi: qup: fix PM reference leak in spi_qup_remove() (git-fixes).\n- spi: spi-fsl-dspi: Accelerate transfers using larger word size if possible (bsc#1167260).\n- spi: spi-fsl-dspi: Add comments around dspi_pop_tx and dspi_push_rx functions (bsc#1167260).\n- spi: spi-fsl-dspi: Add support for LS1028A (bsc#1167260).\n- spi: spi-fsl-dspi: Adding shutdown hook (bsc#1167260).\n- spi: spi-fsl-dspi: Always use the TCFQ devices in poll mode (bsc#1167260).\n- spi: spi-fsl-dspi: Avoid NULL pointer in dspi_slave_abort for non-DMA mode (bsc#1167260).\n- spi: spi-fsl-dspi: Avoid reading more data than written in EOQ mode (bsc#1167260).\n- spi: spi-fsl-dspi: Change usage pattern of SPI_MCR_* and SPI_CTAR_* macros (bsc#1167260).\n- spi: spi-fsl-dspi: Convert TCFQ users to XSPI FIFO mode (bsc#1167260).\n- spi: spi-fsl-dspi: Convert the instantiations that support it to DMA (bsc#1167260).\n- spi: spi-fsl-dspi: Demistify magic value in SPI_SR_CLEAR (bsc#1167260).\n- spi: spi-fsl-dspi: Do not access reserved fields in SPI_MCR (bsc#1167260).\n- spi: spi-fsl-dspi: Do not mask off undefined bits (bsc#1167260).\n- spi: spi-fsl-dspi: Exit the ISR with IRQ_NONE when it\u0027s not ours (bsc#1167260).\n- spi: spi-fsl-dspi: Fix 16-bit word order in 32-bit XSPI mode (bsc#1167260).\n- spi: spi-fsl-dspi: Fix a resource leak in an error handling path (git-fixes).\n- spi: spi-fsl-dspi: Fix bits-per-word acceleration in DMA mode (bsc#1167260).\n- spi: spi-fsl-dspi: Fix code alignment (bsc#1167260).\n- spi: spi-fsl-dspi: Fix external abort on interrupt in resume or exit paths (bsc#1167260).\n- spi: spi-fsl-dspi: Fix interrupt-less DMA mode taking an XSPI code path (bsc#1167260).\n- spi: spi-fsl-dspi: Fix little endian access to PUSHR CMD and TXDATA (bsc#1167260).\n- spi: spi-fsl-dspi: Fix lockup if device is removed during SPI transfer (bsc#1167260).\n- spi: spi-fsl-dspi: Fix lockup if device is shutdown during SPI transfer (bsc#1167260).\n- spi: spi-fsl-dspi: Fix race condition in TCFQ/EOQ interrupt (bsc#1167260).\n- spi: spi-fsl-dspi: Fix typos (bsc#1167260).\n- spi: spi-fsl-dspi: Free DMA memory with matching function (bsc#1167260).\n- spi: spi-fsl-dspi: Implement .max_message_size method for EOQ mode (bsc#1167260).\n- spi: spi-fsl-dspi: Initialize completion before possible interrupt (bsc#1167260).\n- spi: spi-fsl-dspi: LS2080A and LX2160A support XSPI mode (bsc#1167260).\n- spi: spi-fsl-dspi: Make bus-num property optional (bsc#1167260).\n- spi: spi-fsl-dspi: Move dspi_interrupt above dspi_transfer_one_message (bsc#1167260).\n- spi: spi-fsl-dspi: Move invariant configs out of dspi_transfer_one_message (bsc#1167260).\n- spi: spi-fsl-dspi: Optimize dspi_setup_accel for lowest interrupt count (bsc#1167260).\n- spi: spi-fsl-dspi: Parameterize the FIFO size and DMA buffer size (bsc#1167260).\n- spi: spi-fsl-dspi: Protect against races on dspi-\u003ewords_in_flight (bsc#1167260).\n- spi: spi-fsl-dspi: Reduce indentation in dspi_release_dma() (bsc#1167260).\n- spi: spi-fsl-dspi: Reduce indentation level in dspi_interrupt (bsc#1167260).\n- spi: spi-fsl-dspi: Remove impossible to reach error check (bsc#1167260).\n- spi: spi-fsl-dspi: Remove pointless assignment of master-\u003etransfer to NULL (bsc#1167260).\n- spi: spi-fsl-dspi: Remove unused chip-\u003evoid_write_data (bsc#1167260).\n- spi: spi-fsl-dspi: Remove unused defines and includes (bsc#1167260).\n- spi: spi-fsl-dspi: Remove unused initialization of \u0027ret\u0027 in dspi_probe (bsc#1167260).\n- spi: spi-fsl-dspi: Rename fifo_{read,write} and {tx,cmd}_fifo_write (bsc#1167260).\n- spi: spi-fsl-dspi: Replace interruptible wait queue with a simple completion (bsc#1167260).\n- spi: spi-fsl-dspi: Replace legacy spi_master names with spi_controller (bsc#1167260).\n- spi: spi-fsl-dspi: Simplify bytes_per_word gymnastics (bsc#1167260).\n- spi: spi-fsl-dspi: Take software timestamp in dspi_fifo_write (bsc#1167260).\n- spi: spi-fsl-dspi: Use BIT() and GENMASK() macros (bsc#1167260).\n- spi: spi-fsl-dspi: Use EOQ for last word in buffer even for XSPI mode (bsc#1167260).\n- spi: spi-fsl-dspi: Use dma_request_chan() instead dma_request_slave_channel() (bsc#1167260).\n- spi: spi-fsl-dspi: Use poll mode in case the platform IRQ is missing (bsc#1167260).\n- spi: spi-fsl-dspi: Use reverse Christmas tree declaration order (bsc#1167260).\n- spi: spi-fsl-dspi: Use specific compatible strings for all SoC instantiations (bsc#1167260).\n- spi: spi-fsl-dspi: delete EOQ transfer mode (bsc#1167260).\n- spi: spi-fsl-dspi: fix DMA mapping (bsc#1167260).\n- spi: spi-fsl-dspi: fix native data copy (bsc#1167260).\n- spi: spi-fsl-dspi: remove git-fixes Remove git-fixes. Prepare to update the driver. References: bsc#1167260\n- spi: spi-fsl-dspi: set ColdFire to DMA mode (bsc#1167260).\n- spi: spi-fsl-dspi: use XSPI mode instead of DMA for DPAA2 SoCs (bsc#1167260).\n- spi: spi-ti-qspi: Free DMA resources (git-fixes).\n- spi: stm32: make spurious and overrun interrupts visible (git-fixes).\n- squashfs: fix inode lookup sanity checks (bsc#1183750).\n- squashfs: fix xattr id and id lookup sanity checks (bsc#1183750).\n- staging: bcm2835-audio: Replace unsafe strcpy() with strscpy() (git-fixes).\n- staging: comedi: addi_apci_1032: Fix endian problem for COS sample (git-fixes).\n- staging: comedi: addi_apci_1500: Fix endian problem for command sample (git-fixes).\n- staging: comedi: adv_pci1710: Fix endian problem for AI command data (git-fixes).\n- staging: comedi: cb_pcidas64: fix request_irq() warn (git-fixes).\n- staging: comedi: cb_pcidas: fix request_irq() warn (git-fixes).\n- staging: comedi: das6402: Fix endian problem for AI command data (git-fixes).\n- staging: comedi: das800: Fix endian problem for AI command data (git-fixes).\n- staging: comedi: dmm32at: Fix endian problem for AI command data (git-fixes).\n- staging: comedi: me4000: Fix endian problem for AI command data (git-fixes).\n- staging: comedi: pcl711: Fix endian problem for AI command data (git-fixes).\n- staging: comedi: pcl818: Fix endian problem for AI command data (git-fixes).\n- staging: fwserial: Fix error handling in fwserial_create (git-fixes).\n- staging: fwserial: fix TIOCGSERIAL implementation (git-fixes).\n- staging: fwserial: fix TIOCSSERIAL implementation (git-fixes).\n- staging: fwserial: fix TIOCSSERIAL jiffies conversions (git-fixes).\n- staging: fwserial: fix TIOCSSERIAL permission check (git-fixes).\n- staging: ks7010: prevent buffer overflow in ks_wlan_set_scan() (git-fixes).\n- staging: most: sound: add sanity check for function argument (git-fixes).\n- staging: rtl8188eu: fix potential memory corruption in rtw_check_beacon_data() (git-fixes).\n- staging: rtl8188eu: prevent -\u003essid overflow in rtw_wx_set_scan() (git-fixes).\n- staging: rtl8192e: Change state information from u16 to u8 (git-fixes).\n- staging: rtl8192e: Fix incorrect source in memcpy() (git-fixes).\n- staging: rtl8192e: Fix possible buffer overflow in _rtl92e_wx_set_scan (git-fixes).\n- staging: rtl8192u: Fix potential infinite loop (git-fixes).\n- staging: rtl8192u: fix -\u003essid overflow in r8192_wx_set_scan() (git-fixes).\n- staging: rtl8712: Fix possible buffer overflow in r8712_sitesurvey_cmd (git-fixes).\n- staging: rtl8712: unterminated string leads to read overflow (git-fixes).\n- stop_machine: mark helpers __always_inline (git-fixes).\n- supported.conf:\n- supported.conf: add bsc1185010 dependency\n- supported.conf: mark usb_otg_fsm as supported (bsc#1185010)\n- tcp: fix to update snd_wl1 in bulk receiver fast path (\u0026lt;cover.1620748346.git.mkubecek@suse.cz\u003e).\n- tee: optee: remove need_resched() before cond_resched() (git-fixes).\n- tee: optee: replace might_sleep with cond_resched (git-fixes).\n- thermal/core: Add NULL pointer check before using cooling device stats (git-fixes).\n- thermal/drivers/cpufreq_cooling: Update cpufreq_state only if state has changed (git-fixes).\n- thermal/drivers/ti-soc-thermal/bandgap Remove unused variable \u0027val\u0027 (git-fixes).\n- thermal: thermal_of: Fix error return code of thermal_of_populate_bind_params() (git-fixes).\n- thunderbolt: Fix a leak in tb_retimer_add() (git-fixes).\n- thunderbolt: Fix a leak in tb_retimer_add() (git-fixes).\n- thunderbolt: Fix off by one in tb_port_find_retimer() (git-fixes).\n- thunderbolt: Fix off by one in tb_port_find_retimer() (git-fixes).\n- thunderbolt: Initialize HopID IDAs in tb_switch_alloc() (git-fixes).\n- tools/resolve_btfids: Fix build error with older host toolchains (bsc#1177028).\n- tpm: acpi: Check eventlog signature before using it (git-fixes).\n- tracing: Map all PIDs to command lines (git-fixes).\n- tty: amiserial: fix TIOCSSERIAL permission check (git-fixes).\n- tty: fix memory leak in vc_deallocate (git-fixes).\n- tty: moxa: fix TIOCSSERIAL jiffies conversions (git-fixes).\n- tty: moxa: fix TIOCSSERIAL permission check (git-fixes).\n- tty: serial: lpuart: fix lpuart32_write usage (git-fixes).\n- tty: serial: ucc_uart: replace qe_io{read,write}* wrappers by generic io{read,write}* (git-fixes).\n- udlfb: Fix memory leak in dlfb_usb_probe (git-fixes).\n- uio: uio_hv_generic: use devm_kzalloc() for private data alloc (git-fixes).\n- uio_hv_generic: Fix a memory leak in error handling paths (git-fixes).\n- uio_hv_generic: Fix another memory leak in error handling paths (git-fixes).\n- uio_hv_generic: add missed sysfs_remove_bin_file (git-fixes).\n- usb-storage: Add quirk to defeat Kindle\u0027s automatic unload (git-fixes).\n- usb: Remove dev_err() usage after platform_get_irq() (git-fixes).\n- usb: core: hub: Fix PM reference leak in usb_port_resume() (git-fixes).\n- usb: core: hub: fix race condition about TRSMRCY of resume (git-fixes).\n- usb: dwc2: Fix HPRT0.PrtSusp bit setting for HiKey 960 board (git-fixes).\n- usb: dwc2: Fix gadget DMA unmap direction (git-fixes).\n- usb: dwc2: Fix hibernation between host and device modes (git-fixes).\n- usb: dwc2: Fix host mode hibernation exit with remote wakeup flow (git-fixes).\n- usb: dwc2: Fix session request interrupt handler (git-fixes).\n- usb: dwc2: Prevent core suspend when port connection flag is 0 (git-fixes).\n- usb: dwc3: Switch to use device_property_count_u32() (git-fixes).\n- usb: dwc3: Update soft-reset wait polling rate (git-fixes).\n- usb: dwc3: gadget: Fix START_TRANSFER link state check (git-fixes).\n- usb: dwc3: gadget: Return success always for kick transfer in ep queue (git-fixes).\n- usb: dwc3: keystone: use devm_platform_ioremap_resource() to simplify code (git-fixes).\n- usb: dwc3: meson-g12a: use devm_platform_ioremap_resource() to simplify code (git-fixes).\n- usb: dwc3: omap: improve extcon initialization (git-fixes).\n- usb: dwc3: pci: Enable usb2-gadget-lpm-disable for Intel Merrifield (git-fixes).\n- usb: dwc3: qcom: Add missing DWC3 OF node refcount decrement (git-fixes).\n- usb: dwc3: qcom: Honor wakeup enabled/disabled state (git-fixes).\n- usb: fotg210-hcd: Fix an error message (git-fixes).\n- usb: gadget/function/f_fs string table fix for multiple languages (git-fixes).\n- usb: gadget: Fix double free of device descriptor pointers (git-fixes).\n- usb: gadget: aspeed: fix dma map failure (git-fixes).\n- usb: gadget: configfs: Fix KASAN use-after-free (git-fixes).\n- usb: gadget: dummy_hcd: fix gpf in gadget_setup (git-fixes).\n- usb: gadget: f_uac1: stop playback on function disable (git-fixes).\n- usb: gadget: f_uac1: validate input parameters (git-fixes).\n- usb: gadget: f_uac2: always increase endpoint max_packet_size by one audio slot (git-fixes).\n- usb: gadget: f_uac2: validate input parameters (git-fixes).\n- usb: gadget: pch_udc: Check for DMA mapping error (git-fixes).\n- usb: gadget: pch_udc: Check if driver is present before calling -\u003esetup() (git-fixes).\n- usb: gadget: pch_udc: Move pch_udc_init() to satisfy kernel doc (git-fixes).\n- usb: gadget: pch_udc: Replace cpu_to_le32() by lower_32_bits() (git-fixes).\n- usb: gadget: pch_udc: Revert d3cb25a12138 completely (git-fixes).\n- usb: gadget: r8a66597: Add missing null check on return from platform_get_resource (git-fixes).\n- usb: gadget: udc: amd5536udc_pci fix null-ptr-dereference (git-fixes).\n- usb: gadget: uvc: add bInterval checking for HS mode (git-fixes).\n- usb: musb: Fix suspend with devices connected for a64 (git-fixes).\n- usb: musb: fix PM reference leak in musb_irq_work() (git-fixes).\n- usb: pci-quirks: disable D3cold on xhci suspend for s2idle on AMD Renoire (bsc#1185840).\n- usb: renesas_usbhs: Clear PIPECFG for re-enabling pipe with other EPNUM (git-fixes).\n- usb: roles: Call try_module_get() from usb_role_switch_find_by_fwnode() (git-fixes).\n- usb: roles: Call try_module_get() from usb_role_switch_find_by_fwnode() (git-fixes).\n- usb: sl811-hcd: improve misleading indentation (git-fixes).\n- usb: typec: Remove vdo[3] part of tps6598x_rx_identity_reg struct (git-fixes).\n- usb: typec: tcpci: Check ROLE_CONTROL while interpreting CC_STATUS (git-fixes).\n- usb: typec: tcpm: Address incorrect values of tcpm psy for fixed supply (git-fixes).\n- usb: typec: tcpm: Honour pSnkStdby requirement during negotiation (git-fixes).\n- usb: typec: tcpm: Invoke power_supply_changed for tcpm-source-psy- (git-fixes).\n- usb: typec: tcpm: Invoke power_supply_changed for tcpm-source-psy- (git-fixes).\n- usb: typec: tps6598x: Fix return value check in tps6598x_probe() (git-fixes).\n- usb: typec: tps6598x: Fix return value check in tps6598x_probe() (git-fixes).\n- usb: typec: ucsi: Put fwnode in any case during -\u003eprobe() (git-fixes).\n- usb: webcam: Invalid size of Processing Unit Descriptor (git-fixes).\n- usb: xhci-mtk: fix broken streams issue on 0.96 xHCI (git-fixes).\n- usb: xhci-mtk: improve bandwidth scheduling with TT (git-fixes).\n- usb: xhci-mtk: remove or operator for setting schedule parameters (git-fixes).\n- usb: xhci: Fix ASMedia ASM1042A and ASM3242 DMA addressing (git-fixes).\n- usb: xhci: Fix port minor revision (git-fixes).\n- usb: xhci: Increase timeout for HC halt (git-fixes).\n- usb: xhci: do not perform Soft Retry for some xHCI hosts (git-fixes).\n- usbip: Fix incorrect double assignment to udc-\u003eud.tcp_rx (git-fixes).\n- usbip: fix stub_dev to check for stream socket (git-fixes).\n- usbip: fix stub_dev usbip_sockfd_store() races leading to gpf (git-fixes).\n- usbip: fix vhci_hcd attach_store() races leading to gpf (git-fixes).\n- usbip: fix vhci_hcd to check for stream socket (git-fixes).\n- usbip: fix vudc to check for stream socket (git-fixes).\n- usbip: fix vudc usbip_sockfd_store races leading to gpf (git-fixes).\n- usbip: tools: fix build error for multiple definition (git-fixes).\n- usbip: vhci_hcd fix shift out-of-bounds in vhci_hub_control() (git-fixes).\n- use __netdev_notify_peers in ibmvnic (bsc#1183871 ltc#192139).\n- veth: Store queue_mapping independently of XDP prog presence (git-fixes).\n- vfio-pci/zdev: fix possible segmentation fault issue (git-fixes).\n- vfio/iommu_type1: Populate full dirty when detach non-pinned group (bsc#1183326).\n- vfio/mdev: Do not allow a mdev_type to have a NULL parent pointer (git-fixes).\n- vfio/mdev: Make to_mdev_device() into a static inline (git-fixes).\n- vfio/pci: Add missing range check in vfio_pci_mmap (git-fixes).\n- vfio/pci: Move VGA and VF initialization to functions (git-fixes).\n- vfio/pci: Re-order vfio_pci_probe() (git-fixes).\n- vgacon: Record video mode changes with VT_RESIZEX (git-fixes).\n- video: fbdev: acornfb: remove free_unused_pages() (bsc#1152489)\n- video: hyperv_fb: Add ratelimit on error message (bsc#1185725).\n- video: hyperv_fb: Fix a double free in hvfb_probe (git-fixes).\n- virt_wifi: Return micros for BSS TSF values (git-fixes).\n- virtiofs: fix memory leak in virtio_fs_probe() (bsc#1185558).\n- vrf: fix a comment about loopback device (git-fixes).\n- vt/consolemap: do font sum unsigned (git-fixes).\n- vxlan: do not modify the shared tunnel info when PMTU triggers an ICMP reply (bsc#1176447).\n- vxlan: move debug check after netdev unregister (git-fixes).\n- watchdog/softlockup: Remove obsolete check of last reported task (bsc#1185982).\n- watchdog/softlockup: report the overall time of softlockups (bsc#1185982).\n- watchdog: explicitly update timestamp when reporting softlockup (bsc#1185982).\n- watchdog: rename __touch_watchdog() to a better descriptive name (bsc#1185982).\n- whitespace cleanup\n- wl3501_cs: Fix out-of-bounds warnings in wl3501_mgmt_join (git-fixes).\n- wl3501_cs: Fix out-of-bounds warnings in wl3501_send_pkt (git-fixes).\n- wlcore: Fix command execute failure 19 for wl12xx (git-fixes).\n- workqueue: Minor follow-ups to the rescuer destruction change (bsc#1185911).\n- workqueue: Move the position of debug_work_activate() in __queue_work() (bsc#1184893).\n- workqueue: more destroy_workqueue() fixes (bsc#1185911).\n- x86,swiotlb: Adjust SWIOTLB bounce buffer size for SEV guests (bsc#1186219).\n- x86/crash: Fix crash_setup_memmap_entries() out-of-bounds access (bsc#1152489).\n- x86/fsgsbase/64: Fix NULL deref in 86_fsgsbase_read_task (bsc#1152489).\n- x86/insn: Add some Intel instructions to the opcode map (bsc#1184760).\n- x86/insn: Add some more Intel instructions to the opcode map (bsc#1184760).\n- x86/ioapic: Ignore IRQ2 again (bsc#1152489).\n- x86/mem_encrypt: Correct physical address calculation in __set_clr_pte_enc() (bsc#1152489).\n- x86/microcode: Check for offline CPUs before requesting new microcode (bsc#1152489).\n- x86/mm: Fix NX bit clearing issue in kernel_map_pages_in_pgd (bsc#1152489).\n- x86/platform/uv: Set section block size for hubless architectures (bsc#1152489).\n- x86/reboot: Force all cpus to exit VMX root if VMX is supported (bsc#1152489).\n- x86/sev-es: Invalidate the GHCB after completing VMGEXIT (bsc#1178134).\n- x86/sev-es: Move sev_es_put_ghcb() in prep for follow on patch (bsc#1178134).\n- x86: Introduce TS_COMPAT_RESTART to fix get_nr_restart_syscall() (bsc#1152489).\n- xen/events: avoid handling the same event on two cpus at the same time (git-fixes).\n- xen/events: do not unmask an event channel when an eoi is pending (git-fixes).\n- xen/events: reset affinity of 2-level event when tearing it down (git-fixes).\n- xen/evtchn: Change irq_info lock to raw_spinlock_t (git-fixes).\n- xfrm: Provide private skb extensions for segmented and hw offloaded ESP packets (bsc#1176447).\n- xfs: group quota should return EDQUOT when prj quota enabled (bsc#1180980).\n- xhci: Do not use GFP_KERNEL in (potentially) atomic context (git-fixes).\n- xhci: Fix repeated xhci wake after suspend due to uncleared internal wake state (git-fixes).\n- xhci: Improve detection of device initiated wake signal (git-fixes).\n- xhci: check control context is valid before dereferencing it (git-fixes).\n- xhci: fix potential array out of bounds with several interrupters (git-fixes).\n- xsk: Respect device\u0027s headroom and tailroom on generic xmit path (git-fixes).\n- xsk: Respect device\u0027s headroom and tailroom on generic xmit path (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-SLE-15.3-2021-1977",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_1977-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2021:1977-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2021:1977-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/"
},
{
"category": "self",
"summary": "SUSE Bug 1055117",
"url": "https://bugzilla.suse.com/1055117"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1087082",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "self",
"summary": "SUSE Bug 1113295",
"url": "https://bugzilla.suse.com/1113295"
},
{
"category": "self",
"summary": "SUSE Bug 1133021",
"url": "https://bugzilla.suse.com/1133021"
},
{
"category": "self",
"summary": "SUSE Bug 1152457",
"url": "https://bugzilla.suse.com/1152457"
},
{
"category": "self",
"summary": "SUSE Bug 1152472",
"url": "https://bugzilla.suse.com/1152472"
},
{
"category": "self",
"summary": "SUSE Bug 1152489",
"url": "https://bugzilla.suse.com/1152489"
},
{
"category": "self",
"summary": "SUSE Bug 1153274",
"url": "https://bugzilla.suse.com/1153274"
},
{
"category": "self",
"summary": "SUSE Bug 1154353",
"url": "https://bugzilla.suse.com/1154353"
},
{
"category": "self",
"summary": "SUSE Bug 1155518",
"url": "https://bugzilla.suse.com/1155518"
},
{
"category": "self",
"summary": "SUSE Bug 1156395",
"url": "https://bugzilla.suse.com/1156395"
},
{
"category": "self",
"summary": "SUSE Bug 1160634",
"url": "https://bugzilla.suse.com/1160634"
},
{
"category": "self",
"summary": "SUSE Bug 1164648",
"url": "https://bugzilla.suse.com/1164648"
},
{
"category": "self",
"summary": "SUSE Bug 1167260",
"url": "https://bugzilla.suse.com/1167260"
},
{
"category": "self",
"summary": "SUSE Bug 1167574",
"url": "https://bugzilla.suse.com/1167574"
},
{
"category": "self",
"summary": "SUSE Bug 1167773",
"url": "https://bugzilla.suse.com/1167773"
},
{
"category": "self",
"summary": "SUSE Bug 1168777",
"url": "https://bugzilla.suse.com/1168777"
},
{
"category": "self",
"summary": "SUSE Bug 1168838",
"url": "https://bugzilla.suse.com/1168838"
},
{
"category": "self",
"summary": "SUSE Bug 1169709",
"url": "https://bugzilla.suse.com/1169709"
},
{
"category": "self",
"summary": "SUSE Bug 1171295",
"url": "https://bugzilla.suse.com/1171295"
},
{
"category": "self",
"summary": "SUSE Bug 1173485",
"url": "https://bugzilla.suse.com/1173485"
},
{
"category": "self",
"summary": "SUSE Bug 1174416",
"url": "https://bugzilla.suse.com/1174416"
},
{
"category": "self",
"summary": "SUSE Bug 1174426",
"url": "https://bugzilla.suse.com/1174426"
},
{
"category": "self",
"summary": "SUSE Bug 1175995",
"url": "https://bugzilla.suse.com/1175995"
},
{
"category": "self",
"summary": "SUSE Bug 1176447",
"url": "https://bugzilla.suse.com/1176447"
},
{
"category": "self",
"summary": "SUSE Bug 1176774",
"url": "https://bugzilla.suse.com/1176774"
},
{
"category": "self",
"summary": "SUSE Bug 1177028",
"url": "https://bugzilla.suse.com/1177028"
},
{
"category": "self",
"summary": "SUSE Bug 1177326",
"url": "https://bugzilla.suse.com/1177326"
},
{
"category": "self",
"summary": "SUSE Bug 1177666",
"url": "https://bugzilla.suse.com/1177666"
},
{
"category": "self",
"summary": "SUSE Bug 1178089",
"url": "https://bugzilla.suse.com/1178089"
},
{
"category": "self",
"summary": "SUSE Bug 1178134",
"url": "https://bugzilla.suse.com/1178134"
},
{
"category": "self",
"summary": "SUSE Bug 1178163",
"url": "https://bugzilla.suse.com/1178163"
},
{
"category": "self",
"summary": "SUSE Bug 1178330",
"url": "https://bugzilla.suse.com/1178330"
},
{
"category": "self",
"summary": "SUSE Bug 1178378",
"url": "https://bugzilla.suse.com/1178378"
},
{
"category": "self",
"summary": "SUSE Bug 1178418",
"url": "https://bugzilla.suse.com/1178418"
},
{
"category": "self",
"summary": "SUSE Bug 1179243",
"url": "https://bugzilla.suse.com/1179243"
},
{
"category": "self",
"summary": "SUSE Bug 1179519",
"url": "https://bugzilla.suse.com/1179519"
},
{
"category": "self",
"summary": "SUSE Bug 1179825",
"url": "https://bugzilla.suse.com/1179825"
},
{
"category": "self",
"summary": "SUSE Bug 1179827",
"url": "https://bugzilla.suse.com/1179827"
},
{
"category": "self",
"summary": "SUSE Bug 1179851",
"url": "https://bugzilla.suse.com/1179851"
},
{
"category": "self",
"summary": "SUSE Bug 1180197",
"url": "https://bugzilla.suse.com/1180197"
},
{
"category": "self",
"summary": "SUSE Bug 1180814",
"url": "https://bugzilla.suse.com/1180814"
},
{
"category": "self",
"summary": "SUSE Bug 1180846",
"url": "https://bugzilla.suse.com/1180846"
},
{
"category": "self",
"summary": "SUSE Bug 1181104",
"url": "https://bugzilla.suse.com/1181104"
},
{
"category": "self",
"summary": "SUSE Bug 1181383",
"url": "https://bugzilla.suse.com/1181383"
},
{
"category": "self",
"summary": "SUSE Bug 1181507",
"url": "https://bugzilla.suse.com/1181507"
},
{
"category": "self",
"summary": "SUSE Bug 1181674",
"url": "https://bugzilla.suse.com/1181674"
},
{
"category": "self",
"summary": "SUSE Bug 1181862",
"url": "https://bugzilla.suse.com/1181862"
},
{
"category": "self",
"summary": "SUSE Bug 1182077",
"url": "https://bugzilla.suse.com/1182077"
},
{
"category": "self",
"summary": "SUSE Bug 1182257",
"url": "https://bugzilla.suse.com/1182257"
},
{
"category": "self",
"summary": "SUSE Bug 1182377",
"url": "https://bugzilla.suse.com/1182377"
},
{
"category": "self",
"summary": "SUSE Bug 1182552",
"url": "https://bugzilla.suse.com/1182552"
},
{
"category": "self",
"summary": "SUSE Bug 1182574",
"url": "https://bugzilla.suse.com/1182574"
},
{
"category": "self",
"summary": "SUSE Bug 1182613",
"url": "https://bugzilla.suse.com/1182613"
},
{
"category": "self",
"summary": "SUSE Bug 1182712",
"url": "https://bugzilla.suse.com/1182712"
},
{
"category": "self",
"summary": "SUSE Bug 1182715",
"url": "https://bugzilla.suse.com/1182715"
},
{
"category": "self",
"summary": "SUSE Bug 1182717",
"url": "https://bugzilla.suse.com/1182717"
},
{
"category": "self",
"summary": "SUSE Bug 1182999",
"url": "https://bugzilla.suse.com/1182999"
},
{
"category": "self",
"summary": "SUSE Bug 1183022",
"url": "https://bugzilla.suse.com/1183022"
},
{
"category": "self",
"summary": "SUSE Bug 1183069",
"url": "https://bugzilla.suse.com/1183069"
},
{
"category": "self",
"summary": "SUSE Bug 1183252",
"url": "https://bugzilla.suse.com/1183252"
},
{
"category": "self",
"summary": "SUSE Bug 1183277",
"url": "https://bugzilla.suse.com/1183277"
},
{
"category": "self",
"summary": "SUSE Bug 1183278",
"url": "https://bugzilla.suse.com/1183278"
},
{
"category": "self",
"summary": "SUSE Bug 1183279",
"url": "https://bugzilla.suse.com/1183279"
},
{
"category": "self",
"summary": "SUSE Bug 1183280",
"url": "https://bugzilla.suse.com/1183280"
},
{
"category": "self",
"summary": "SUSE Bug 1183281",
"url": "https://bugzilla.suse.com/1183281"
},
{
"category": "self",
"summary": "SUSE Bug 1183282",
"url": "https://bugzilla.suse.com/1183282"
},
{
"category": "self",
"summary": "SUSE Bug 1183283",
"url": "https://bugzilla.suse.com/1183283"
},
{
"category": "self",
"summary": "SUSE Bug 1183284",
"url": "https://bugzilla.suse.com/1183284"
},
{
"category": "self",
"summary": "SUSE Bug 1183285",
"url": "https://bugzilla.suse.com/1183285"
},
{
"category": "self",
"summary": "SUSE Bug 1183286",
"url": "https://bugzilla.suse.com/1183286"
},
{
"category": "self",
"summary": "SUSE Bug 1183287",
"url": "https://bugzilla.suse.com/1183287"
},
{
"category": "self",
"summary": "SUSE Bug 1183288",
"url": "https://bugzilla.suse.com/1183288"
},
{
"category": "self",
"summary": "SUSE Bug 1183289",
"url": "https://bugzilla.suse.com/1183289"
},
{
"category": "self",
"summary": "SUSE Bug 1183310",
"url": "https://bugzilla.suse.com/1183310"
},
{
"category": "self",
"summary": "SUSE Bug 1183311",
"url": "https://bugzilla.suse.com/1183311"
},
{
"category": "self",
"summary": "SUSE Bug 1183312",
"url": "https://bugzilla.suse.com/1183312"
},
{
"category": "self",
"summary": "SUSE Bug 1183313",
"url": "https://bugzilla.suse.com/1183313"
},
{
"category": "self",
"summary": "SUSE Bug 1183314",
"url": "https://bugzilla.suse.com/1183314"
},
{
"category": "self",
"summary": "SUSE Bug 1183315",
"url": "https://bugzilla.suse.com/1183315"
},
{
"category": "self",
"summary": "SUSE Bug 1183316",
"url": "https://bugzilla.suse.com/1183316"
},
{
"category": "self",
"summary": "SUSE Bug 1183317",
"url": "https://bugzilla.suse.com/1183317"
},
{
"category": "self",
"summary": "SUSE Bug 1183318",
"url": "https://bugzilla.suse.com/1183318"
},
{
"category": "self",
"summary": "SUSE Bug 1183319",
"url": "https://bugzilla.suse.com/1183319"
},
{
"category": "self",
"summary": "SUSE Bug 1183320",
"url": "https://bugzilla.suse.com/1183320"
},
{
"category": "self",
"summary": "SUSE Bug 1183321",
"url": "https://bugzilla.suse.com/1183321"
},
{
"category": "self",
"summary": "SUSE Bug 1183322",
"url": "https://bugzilla.suse.com/1183322"
},
{
"category": "self",
"summary": "SUSE Bug 1183323",
"url": "https://bugzilla.suse.com/1183323"
},
{
"category": "self",
"summary": "SUSE Bug 1183324",
"url": "https://bugzilla.suse.com/1183324"
},
{
"category": "self",
"summary": "SUSE Bug 1183326",
"url": "https://bugzilla.suse.com/1183326"
},
{
"category": "self",
"summary": "SUSE Bug 1183346",
"url": "https://bugzilla.suse.com/1183346"
},
{
"category": "self",
"summary": "SUSE Bug 1183366",
"url": "https://bugzilla.suse.com/1183366"
},
{
"category": "self",
"summary": "SUSE Bug 1183369",
"url": "https://bugzilla.suse.com/1183369"
},
{
"category": "self",
"summary": "SUSE Bug 1183386",
"url": "https://bugzilla.suse.com/1183386"
},
{
"category": "self",
"summary": "SUSE Bug 1183405",
"url": "https://bugzilla.suse.com/1183405"
},
{
"category": "self",
"summary": "SUSE Bug 1183412",
"url": "https://bugzilla.suse.com/1183412"
},
{
"category": "self",
"summary": "SUSE Bug 1183427",
"url": "https://bugzilla.suse.com/1183427"
},
{
"category": "self",
"summary": "SUSE Bug 1183428",
"url": "https://bugzilla.suse.com/1183428"
},
{
"category": "self",
"summary": "SUSE Bug 1183445",
"url": "https://bugzilla.suse.com/1183445"
},
{
"category": "self",
"summary": "SUSE Bug 1183447",
"url": "https://bugzilla.suse.com/1183447"
},
{
"category": "self",
"summary": "SUSE Bug 1183491",
"url": "https://bugzilla.suse.com/1183491"
},
{
"category": "self",
"summary": "SUSE Bug 1183501",
"url": "https://bugzilla.suse.com/1183501"
},
{
"category": "self",
"summary": "SUSE Bug 1183509",
"url": "https://bugzilla.suse.com/1183509"
},
{
"category": "self",
"summary": "SUSE Bug 1183530",
"url": "https://bugzilla.suse.com/1183530"
},
{
"category": "self",
"summary": "SUSE Bug 1183534",
"url": "https://bugzilla.suse.com/1183534"
},
{
"category": "self",
"summary": "SUSE Bug 1183540",
"url": "https://bugzilla.suse.com/1183540"
},
{
"category": "self",
"summary": "SUSE Bug 1183593",
"url": "https://bugzilla.suse.com/1183593"
},
{
"category": "self",
"summary": "SUSE Bug 1183596",
"url": "https://bugzilla.suse.com/1183596"
},
{
"category": "self",
"summary": "SUSE Bug 1183598",
"url": "https://bugzilla.suse.com/1183598"
},
{
"category": "self",
"summary": "SUSE Bug 1183637",
"url": "https://bugzilla.suse.com/1183637"
},
{
"category": "self",
"summary": "SUSE Bug 1183646",
"url": "https://bugzilla.suse.com/1183646"
},
{
"category": "self",
"summary": "SUSE Bug 1183658",
"url": "https://bugzilla.suse.com/1183658"
},
{
"category": "self",
"summary": "SUSE Bug 1183662",
"url": "https://bugzilla.suse.com/1183662"
},
{
"category": "self",
"summary": "SUSE Bug 1183686",
"url": "https://bugzilla.suse.com/1183686"
},
{
"category": "self",
"summary": "SUSE Bug 1183692",
"url": "https://bugzilla.suse.com/1183692"
},
{
"category": "self",
"summary": "SUSE Bug 1183750",
"url": "https://bugzilla.suse.com/1183750"
},
{
"category": "self",
"summary": "SUSE Bug 1183757",
"url": "https://bugzilla.suse.com/1183757"
},
{
"category": "self",
"summary": "SUSE Bug 1183775",
"url": "https://bugzilla.suse.com/1183775"
},
{
"category": "self",
"summary": "SUSE Bug 1183815",
"url": "https://bugzilla.suse.com/1183815"
},
{
"category": "self",
"summary": "SUSE Bug 1183868",
"url": "https://bugzilla.suse.com/1183868"
},
{
"category": "self",
"summary": "SUSE Bug 1183871",
"url": "https://bugzilla.suse.com/1183871"
},
{
"category": "self",
"summary": "SUSE Bug 1183873",
"url": "https://bugzilla.suse.com/1183873"
},
{
"category": "self",
"summary": "SUSE Bug 1183947",
"url": "https://bugzilla.suse.com/1183947"
},
{
"category": "self",
"summary": "SUSE Bug 1183976",
"url": "https://bugzilla.suse.com/1183976"
},
{
"category": "self",
"summary": "SUSE Bug 1184074",
"url": "https://bugzilla.suse.com/1184074"
},
{
"category": "self",
"summary": "SUSE Bug 1184081",
"url": "https://bugzilla.suse.com/1184081"
},
{
"category": "self",
"summary": "SUSE Bug 1184082",
"url": "https://bugzilla.suse.com/1184082"
},
{
"category": "self",
"summary": "SUSE Bug 1184120",
"url": "https://bugzilla.suse.com/1184120"
},
{
"category": "self",
"summary": "SUSE Bug 1184167",
"url": "https://bugzilla.suse.com/1184167"
},
{
"category": "self",
"summary": "SUSE Bug 1184168",
"url": "https://bugzilla.suse.com/1184168"
},
{
"category": "self",
"summary": "SUSE Bug 1184170",
"url": "https://bugzilla.suse.com/1184170"
},
{
"category": "self",
"summary": "SUSE Bug 1184171",
"url": "https://bugzilla.suse.com/1184171"
},
{
"category": "self",
"summary": "SUSE Bug 1184192",
"url": "https://bugzilla.suse.com/1184192"
},
{
"category": "self",
"summary": "SUSE Bug 1184193",
"url": "https://bugzilla.suse.com/1184193"
},
{
"category": "self",
"summary": "SUSE Bug 1184194",
"url": "https://bugzilla.suse.com/1184194"
},
{
"category": "self",
"summary": "SUSE Bug 1184196",
"url": "https://bugzilla.suse.com/1184196"
},
{
"category": "self",
"summary": "SUSE Bug 1184197",
"url": "https://bugzilla.suse.com/1184197"
},
{
"category": "self",
"summary": "SUSE Bug 1184198",
"url": "https://bugzilla.suse.com/1184198"
},
{
"category": "self",
"summary": "SUSE Bug 1184199",
"url": "https://bugzilla.suse.com/1184199"
},
{
"category": "self",
"summary": "SUSE Bug 1184208",
"url": "https://bugzilla.suse.com/1184208"
},
{
"category": "self",
"summary": "SUSE Bug 1184209",
"url": "https://bugzilla.suse.com/1184209"
},
{
"category": "self",
"summary": "SUSE Bug 1184211",
"url": "https://bugzilla.suse.com/1184211"
},
{
"category": "self",
"summary": "SUSE Bug 1184217",
"url": "https://bugzilla.suse.com/1184217"
},
{
"category": "self",
"summary": "SUSE Bug 1184218",
"url": "https://bugzilla.suse.com/1184218"
},
{
"category": "self",
"summary": "SUSE Bug 1184219",
"url": "https://bugzilla.suse.com/1184219"
},
{
"category": "self",
"summary": "SUSE Bug 1184220",
"url": "https://bugzilla.suse.com/1184220"
},
{
"category": "self",
"summary": "SUSE Bug 1184224",
"url": "https://bugzilla.suse.com/1184224"
},
{
"category": "self",
"summary": "SUSE Bug 1184264",
"url": "https://bugzilla.suse.com/1184264"
},
{
"category": "self",
"summary": "SUSE Bug 1184386",
"url": "https://bugzilla.suse.com/1184386"
},
{
"category": "self",
"summary": "SUSE Bug 1184388",
"url": "https://bugzilla.suse.com/1184388"
},
{
"category": "self",
"summary": "SUSE Bug 1184391",
"url": "https://bugzilla.suse.com/1184391"
},
{
"category": "self",
"summary": "SUSE Bug 1184393",
"url": "https://bugzilla.suse.com/1184393"
},
{
"category": "self",
"summary": "SUSE Bug 1184436",
"url": "https://bugzilla.suse.com/1184436"
},
{
"category": "self",
"summary": "SUSE Bug 1184485",
"url": "https://bugzilla.suse.com/1184485"
},
{
"category": "self",
"summary": "SUSE Bug 1184514",
"url": "https://bugzilla.suse.com/1184514"
},
{
"category": "self",
"summary": "SUSE Bug 1184585",
"url": "https://bugzilla.suse.com/1184585"
},
{
"category": "self",
"summary": "SUSE Bug 1184611",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "self",
"summary": "SUSE Bug 1184615",
"url": "https://bugzilla.suse.com/1184615"
},
{
"category": "self",
"summary": "SUSE Bug 1184650",
"url": "https://bugzilla.suse.com/1184650"
},
{
"category": "self",
"summary": "SUSE Bug 1184710",
"url": "https://bugzilla.suse.com/1184710"
},
{
"category": "self",
"summary": "SUSE Bug 1184724",
"url": "https://bugzilla.suse.com/1184724"
},
{
"category": "self",
"summary": "SUSE Bug 1184728",
"url": "https://bugzilla.suse.com/1184728"
},
{
"category": "self",
"summary": "SUSE Bug 1184730",
"url": "https://bugzilla.suse.com/1184730"
},
{
"category": "self",
"summary": "SUSE Bug 1184731",
"url": "https://bugzilla.suse.com/1184731"
},
{
"category": "self",
"summary": "SUSE Bug 1184736",
"url": "https://bugzilla.suse.com/1184736"
},
{
"category": "self",
"summary": "SUSE Bug 1184737",
"url": "https://bugzilla.suse.com/1184737"
},
{
"category": "self",
"summary": "SUSE Bug 1184738",
"url": "https://bugzilla.suse.com/1184738"
},
{
"category": "self",
"summary": "SUSE Bug 1184740",
"url": "https://bugzilla.suse.com/1184740"
},
{
"category": "self",
"summary": "SUSE Bug 1184741",
"url": "https://bugzilla.suse.com/1184741"
},
{
"category": "self",
"summary": "SUSE Bug 1184742",
"url": "https://bugzilla.suse.com/1184742"
},
{
"category": "self",
"summary": "SUSE Bug 1184769",
"url": "https://bugzilla.suse.com/1184769"
},
{
"category": "self",
"summary": "SUSE Bug 1184811",
"url": "https://bugzilla.suse.com/1184811"
},
{
"category": "self",
"summary": "SUSE Bug 1184855",
"url": "https://bugzilla.suse.com/1184855"
},
{
"category": "self",
"summary": "SUSE Bug 1184934",
"url": "https://bugzilla.suse.com/1184934"
},
{
"category": "self",
"summary": "SUSE Bug 1184942",
"url": "https://bugzilla.suse.com/1184942"
},
{
"category": "self",
"summary": "SUSE Bug 1184943",
"url": "https://bugzilla.suse.com/1184943"
},
{
"category": "self",
"summary": "SUSE Bug 1184955",
"url": "https://bugzilla.suse.com/1184955"
},
{
"category": "self",
"summary": "SUSE Bug 1184969",
"url": "https://bugzilla.suse.com/1184969"
},
{
"category": "self",
"summary": "SUSE Bug 1184984",
"url": "https://bugzilla.suse.com/1184984"
},
{
"category": "self",
"summary": "SUSE Bug 1185010",
"url": "https://bugzilla.suse.com/1185010"
},
{
"category": "self",
"summary": "SUSE Bug 1185113",
"url": "https://bugzilla.suse.com/1185113"
},
{
"category": "self",
"summary": "SUSE Bug 1185233",
"url": "https://bugzilla.suse.com/1185233"
},
{
"category": "self",
"summary": "SUSE Bug 1185269",
"url": "https://bugzilla.suse.com/1185269"
},
{
"category": "self",
"summary": "SUSE Bug 1185428",
"url": "https://bugzilla.suse.com/1185428"
},
{
"category": "self",
"summary": "SUSE Bug 1185491",
"url": "https://bugzilla.suse.com/1185491"
},
{
"category": "self",
"summary": "SUSE Bug 1185495",
"url": "https://bugzilla.suse.com/1185495"
},
{
"category": "self",
"summary": "SUSE Bug 1185549",
"url": "https://bugzilla.suse.com/1185549"
},
{
"category": "self",
"summary": "SUSE Bug 1185550",
"url": "https://bugzilla.suse.com/1185550"
},
{
"category": "self",
"summary": "SUSE Bug 1185558",
"url": "https://bugzilla.suse.com/1185558"
},
{
"category": "self",
"summary": "SUSE Bug 1185573",
"url": "https://bugzilla.suse.com/1185573"
},
{
"category": "self",
"summary": "SUSE Bug 1185581",
"url": "https://bugzilla.suse.com/1185581"
},
{
"category": "self",
"summary": "SUSE Bug 1185586",
"url": "https://bugzilla.suse.com/1185586"
},
{
"category": "self",
"summary": "SUSE Bug 1185587",
"url": "https://bugzilla.suse.com/1185587"
},
{
"category": "self",
"summary": "SUSE Bug 1185606",
"url": "https://bugzilla.suse.com/1185606"
},
{
"category": "self",
"summary": "SUSE Bug 1185640",
"url": "https://bugzilla.suse.com/1185640"
},
{
"category": "self",
"summary": "SUSE Bug 1185641",
"url": "https://bugzilla.suse.com/1185641"
},
{
"category": "self",
"summary": "SUSE Bug 1185642",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "self",
"summary": "SUSE Bug 1185645",
"url": "https://bugzilla.suse.com/1185645"
},
{
"category": "self",
"summary": "SUSE Bug 1185670",
"url": "https://bugzilla.suse.com/1185670"
},
{
"category": "self",
"summary": "SUSE Bug 1185680",
"url": "https://bugzilla.suse.com/1185680"
},
{
"category": "self",
"summary": "SUSE Bug 1185703",
"url": "https://bugzilla.suse.com/1185703"
},
{
"category": "self",
"summary": "SUSE Bug 1185725",
"url": "https://bugzilla.suse.com/1185725"
},
{
"category": "self",
"summary": "SUSE Bug 1185736",
"url": "https://bugzilla.suse.com/1185736"
},
{
"category": "self",
"summary": "SUSE Bug 1185758",
"url": "https://bugzilla.suse.com/1185758"
},
{
"category": "self",
"summary": "SUSE Bug 1185796",
"url": "https://bugzilla.suse.com/1185796"
},
{
"category": "self",
"summary": "SUSE Bug 1185840",
"url": "https://bugzilla.suse.com/1185840"
},
{
"category": "self",
"summary": "SUSE Bug 1185857",
"url": "https://bugzilla.suse.com/1185857"
},
{
"category": "self",
"summary": "SUSE Bug 1185898",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "self",
"summary": "SUSE Bug 1185899",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "self",
"summary": "SUSE Bug 1185911",
"url": "https://bugzilla.suse.com/1185911"
},
{
"category": "self",
"summary": "SUSE Bug 1185938",
"url": "https://bugzilla.suse.com/1185938"
},
{
"category": "self",
"summary": "SUSE Bug 1185950",
"url": "https://bugzilla.suse.com/1185950"
},
{
"category": "self",
"summary": "SUSE Bug 1185980",
"url": "https://bugzilla.suse.com/1185980"
},
{
"category": "self",
"summary": "SUSE Bug 1185988",
"url": "https://bugzilla.suse.com/1185988"
},
{
"category": "self",
"summary": "SUSE Bug 1186009",
"url": "https://bugzilla.suse.com/1186009"
},
{
"category": "self",
"summary": "SUSE Bug 1186061",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "self",
"summary": "SUSE Bug 1186111",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "self",
"summary": "SUSE Bug 1186118",
"url": "https://bugzilla.suse.com/1186118"
},
{
"category": "self",
"summary": "SUSE Bug 1186219",
"url": "https://bugzilla.suse.com/1186219"
},
{
"category": "self",
"summary": "SUSE Bug 1186285",
"url": "https://bugzilla.suse.com/1186285"
},
{
"category": "self",
"summary": "SUSE Bug 1186320",
"url": "https://bugzilla.suse.com/1186320"
},
{
"category": "self",
"summary": "SUSE Bug 1186349",
"url": "https://bugzilla.suse.com/1186349"
},
{
"category": "self",
"summary": "SUSE Bug 1186352",
"url": "https://bugzilla.suse.com/1186352"
},
{
"category": "self",
"summary": "SUSE Bug 1186353",
"url": "https://bugzilla.suse.com/1186353"
},
{
"category": "self",
"summary": "SUSE Bug 1186354",
"url": "https://bugzilla.suse.com/1186354"
},
{
"category": "self",
"summary": "SUSE Bug 1186355",
"url": "https://bugzilla.suse.com/1186355"
},
{
"category": "self",
"summary": "SUSE Bug 1186356",
"url": "https://bugzilla.suse.com/1186356"
},
{
"category": "self",
"summary": "SUSE Bug 1186357",
"url": "https://bugzilla.suse.com/1186357"
},
{
"category": "self",
"summary": "SUSE Bug 1186401",
"url": "https://bugzilla.suse.com/1186401"
},
{
"category": "self",
"summary": "SUSE Bug 1186408",
"url": "https://bugzilla.suse.com/1186408"
},
{
"category": "self",
"summary": "SUSE Bug 1186439",
"url": "https://bugzilla.suse.com/1186439"
},
{
"category": "self",
"summary": "SUSE Bug 1186441",
"url": "https://bugzilla.suse.com/1186441"
},
{
"category": "self",
"summary": "SUSE Bug 1186479",
"url": "https://bugzilla.suse.com/1186479"
},
{
"category": "self",
"summary": "SUSE Bug 1186484",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "self",
"summary": "SUSE Bug 1186498",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "self",
"summary": "SUSE Bug 1186501",
"url": "https://bugzilla.suse.com/1186501"
},
{
"category": "self",
"summary": "SUSE Bug 1186512",
"url": "https://bugzilla.suse.com/1186512"
},
{
"category": "self",
"summary": "SUSE Bug 1186681",
"url": "https://bugzilla.suse.com/1186681"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18814 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18814/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19769 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19769/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24586 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24587 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24587/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24588 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25670 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25670/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25671 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25671/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25672 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25672/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25673 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25673/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26139 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26141 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26145 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26145/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26147 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-27170 page",
"url": "https://www.suse.com/security/cve/CVE-2020-27170/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-27171 page",
"url": "https://www.suse.com/security/cve/CVE-2020-27171/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-27673 page",
"url": "https://www.suse.com/security/cve/CVE-2020-27673/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-27815 page",
"url": "https://www.suse.com/security/cve/CVE-2020-27815/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-35519 page",
"url": "https://www.suse.com/security/cve/CVE-2020-35519/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36310 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36310/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36311 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36311/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36312 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36312/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36322 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36322/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20268 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20268/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23134 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-27363 page",
"url": "https://www.suse.com/security/cve/CVE-2021-27363/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-27364 page",
"url": "https://www.suse.com/security/cve/CVE-2021-27364/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-27365 page",
"url": "https://www.suse.com/security/cve/CVE-2021-27365/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28038 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28038/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28375 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28375/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28660 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28660/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28688 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28688/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28950 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28950/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28952 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28952/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28964 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28964/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28971 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28971/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28972 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28972/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-29154 page",
"url": "https://www.suse.com/security/cve/CVE-2021-29154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-29155 page",
"url": "https://www.suse.com/security/cve/CVE-2021-29155/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-29264 page",
"url": "https://www.suse.com/security/cve/CVE-2021-29264/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-29265 page",
"url": "https://www.suse.com/security/cve/CVE-2021-29265/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-29647 page",
"url": "https://www.suse.com/security/cve/CVE-2021-29647/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-29650 page",
"url": "https://www.suse.com/security/cve/CVE-2021-29650/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30002 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30002/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32399 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33034 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33034/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33200 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3428 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3428/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3444 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3444/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3483 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3483/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3489 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3489/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3490 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3490/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3491 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3491/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-07-11T13:07:21Z",
"generator": {
"date": "2021-07-11T13:07:21Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2021:1977-1",
"initial_release_date": "2021-07-11T13:07:21Z",
"revision_history": [
{
"date": "2021-07-11T13:07:21Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"product": {
"name": "cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"product_id": "cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"product_id": "cluster-md-kmp-default-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"product_id": "cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"product": {
"name": "dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"product_id": "dlm-kmp-64kb-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-59.5.2.aarch64",
"product": {
"name": "dlm-kmp-default-5.3.18-59.5.2.aarch64",
"product_id": "dlm-kmp-default-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"product_id": "dlm-kmp-preempt-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"product": {
"name": "gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"product_id": "gfs2-kmp-64kb-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"product": {
"name": "gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"product_id": "gfs2-kmp-default-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"product_id": "gfs2-kmp-preempt-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-64kb-5.3.18-59.5.2.aarch64",
"product_id": "kernel-64kb-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"product_id": "kernel-64kb-devel-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"product_id": "kernel-64kb-extra-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"product_id": "kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"product_id": "kernel-64kb-optional-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-default-5.3.18-59.5.2.aarch64",
"product_id": "kernel-default-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"product": {
"name": "kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"product_id": "kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"product_id": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-default-devel-5.3.18-59.5.2.aarch64",
"product_id": "kernel-default-devel-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-default-extra-5.3.18-59.5.2.aarch64",
"product_id": "kernel-default-extra-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"product_id": "kernel-default-livepatch-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"product_id": "kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-default-optional-5.3.18-59.5.2.aarch64",
"product_id": "kernel-default-optional-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-59.5.1.aarch64",
"product": {
"name": "kernel-obs-build-5.3.18-59.5.1.aarch64",
"product_id": "kernel-obs-build-5.3.18-59.5.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-59.5.1.aarch64",
"product": {
"name": "kernel-obs-qa-5.3.18-59.5.1.aarch64",
"product_id": "kernel-obs-qa-5.3.18-59.5.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-preempt-5.3.18-59.5.2.aarch64",
"product_id": "kernel-preempt-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"product_id": "kernel-preempt-devel-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"product_id": "kernel-preempt-extra-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"product_id": "kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"product_id": "kernel-preempt-optional-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-59.5.1.aarch64",
"product": {
"name": "kernel-syms-5.3.18-59.5.1.aarch64",
"product_id": "kernel-syms-5.3.18-59.5.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"product": {
"name": "kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"product_id": "kselftests-kmp-64kb-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"product": {
"name": "kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"product_id": "kselftests-kmp-default-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"product_id": "kselftests-kmp-preempt-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"product": {
"name": "ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"product_id": "ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"product_id": "ocfs2-kmp-default-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"product_id": "ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"product": {
"name": "reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"product_id": "reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"product_id": "reiserfs-kmp-default-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"product_id": "reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-5.3.18-59.5.2.noarch",
"product": {
"name": "kernel-devel-5.3.18-59.5.2.noarch",
"product_id": "kernel-devel-5.3.18-59.5.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-5.3.18-59.5.2.noarch",
"product": {
"name": "kernel-docs-5.3.18-59.5.2.noarch",
"product_id": "kernel-docs-5.3.18-59.5.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-5.3.18-59.5.2.noarch",
"product": {
"name": "kernel-docs-html-5.3.18-59.5.2.noarch",
"product_id": "kernel-docs-html-5.3.18-59.5.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-5.3.18-59.5.2.noarch",
"product": {
"name": "kernel-macros-5.3.18-59.5.2.noarch",
"product_id": "kernel-macros-5.3.18-59.5.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-5.3.18-59.5.2.noarch",
"product": {
"name": "kernel-source-5.3.18-59.5.2.noarch",
"product_id": "kernel-source-5.3.18-59.5.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-5.3.18-59.5.2.noarch",
"product": {
"name": "kernel-source-vanilla-5.3.18-59.5.2.noarch",
"product_id": "kernel-source-vanilla-5.3.18-59.5.2.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"product": {
"name": "cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"product_id": "cluster-md-kmp-default-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"product": {
"name": "dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"product_id": "dlm-kmp-default-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"product": {
"name": "gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"product_id": "gfs2-kmp-default-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.3.18-59.5.2.ppc64le",
"product": {
"name": "kernel-debug-5.3.18-59.5.2.ppc64le",
"product_id": "kernel-debug-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"product": {
"name": "kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"product_id": "kernel-debug-devel-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"product": {
"name": "kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"product_id": "kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-59.5.2.ppc64le",
"product": {
"name": "kernel-default-5.3.18-59.5.2.ppc64le",
"product_id": "kernel-default-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"product": {
"name": "kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"product_id": "kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"product_id": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-59.5.2.ppc64le",
"product": {
"name": "kernel-default-devel-5.3.18-59.5.2.ppc64le",
"product_id": "kernel-default-devel-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-59.5.2.ppc64le",
"product": {
"name": "kernel-default-extra-5.3.18-59.5.2.ppc64le",
"product_id": "kernel-default-extra-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"product": {
"name": "kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"product_id": "kernel-default-livepatch-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"product_id": "kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-59.5.2.ppc64le",
"product": {
"name": "kernel-default-optional-5.3.18-59.5.2.ppc64le",
"product_id": "kernel-default-optional-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"product": {
"name": "kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"product_id": "kernel-kvmsmall-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"product_id": "kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-59.5.1.ppc64le",
"product": {
"name": "kernel-obs-build-5.3.18-59.5.1.ppc64le",
"product_id": "kernel-obs-build-5.3.18-59.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"product": {
"name": "kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"product_id": "kernel-obs-qa-5.3.18-59.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-59.5.1.ppc64le",
"product": {
"name": "kernel-syms-5.3.18-59.5.1.ppc64le",
"product_id": "kernel-syms-5.3.18-59.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"product": {
"name": "kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"product_id": "kselftests-kmp-default-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"product": {
"name": "ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"product_id": "ocfs2-kmp-default-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"product": {
"name": "reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"product_id": "reiserfs-kmp-default-5.3.18-59.5.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"product": {
"name": "cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"product_id": "cluster-md-kmp-default-5.3.18-59.5.2.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-59.5.2.s390x",
"product": {
"name": "dlm-kmp-default-5.3.18-59.5.2.s390x",
"product_id": "dlm-kmp-default-5.3.18-59.5.2.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-59.5.2.s390x",
"product": {
"name": "gfs2-kmp-default-5.3.18-59.5.2.s390x",
"product_id": "gfs2-kmp-default-5.3.18-59.5.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-59.5.2.s390x",
"product": {
"name": "kernel-default-5.3.18-59.5.2.s390x",
"product_id": "kernel-default-5.3.18-59.5.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"product": {
"name": "kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"product_id": "kernel-default-base-5.3.18-59.5.2.18.2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"product_id": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-59.5.2.s390x",
"product": {
"name": "kernel-default-devel-5.3.18-59.5.2.s390x",
"product_id": "kernel-default-devel-5.3.18-59.5.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-59.5.2.s390x",
"product": {
"name": "kernel-default-extra-5.3.18-59.5.2.s390x",
"product_id": "kernel-default-extra-5.3.18-59.5.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-59.5.2.s390x",
"product": {
"name": "kernel-default-livepatch-5.3.18-59.5.2.s390x",
"product_id": "kernel-default-livepatch-5.3.18-59.5.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"product_id": "kernel-default-livepatch-devel-5.3.18-59.5.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-59.5.2.s390x",
"product": {
"name": "kernel-default-optional-5.3.18-59.5.2.s390x",
"product_id": "kernel-default-optional-5.3.18-59.5.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-59.5.1.s390x",
"product": {
"name": "kernel-obs-build-5.3.18-59.5.1.s390x",
"product_id": "kernel-obs-build-5.3.18-59.5.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-59.5.1.s390x",
"product": {
"name": "kernel-obs-qa-5.3.18-59.5.1.s390x",
"product_id": "kernel-obs-qa-5.3.18-59.5.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-59.5.1.s390x",
"product": {
"name": "kernel-syms-5.3.18-59.5.1.s390x",
"product_id": "kernel-syms-5.3.18-59.5.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-5.3.18-59.5.2.s390x",
"product": {
"name": "kernel-zfcpdump-5.3.18-59.5.2.s390x",
"product_id": "kernel-zfcpdump-5.3.18-59.5.2.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-59.5.2.s390x",
"product": {
"name": "kselftests-kmp-default-5.3.18-59.5.2.s390x",
"product_id": "kselftests-kmp-default-5.3.18-59.5.2.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"product": {
"name": "ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"product_id": "ocfs2-kmp-default-5.3.18-59.5.2.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"product": {
"name": "reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"product_id": "reiserfs-kmp-default-5.3.18-59.5.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"product_id": "cluster-md-kmp-default-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"product_id": "cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-59.5.2.x86_64",
"product": {
"name": "dlm-kmp-default-5.3.18-59.5.2.x86_64",
"product_id": "dlm-kmp-default-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"product_id": "dlm-kmp-preempt-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"product": {
"name": "gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"product_id": "gfs2-kmp-default-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"product_id": "gfs2-kmp-preempt-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-debug-5.3.18-59.5.2.x86_64",
"product_id": "kernel-debug-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-debug-devel-5.3.18-59.5.2.x86_64",
"product_id": "kernel-debug-devel-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"product_id": "kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-default-5.3.18-59.5.2.x86_64",
"product_id": "kernel-default-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"product": {
"name": "kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"product_id": "kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"product_id": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-default-devel-5.3.18-59.5.2.x86_64",
"product_id": "kernel-default-devel-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-default-extra-5.3.18-59.5.2.x86_64",
"product_id": "kernel-default-extra-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"product_id": "kernel-default-livepatch-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"product_id": "kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-default-optional-5.3.18-59.5.2.x86_64",
"product_id": "kernel-default-optional-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"product_id": "kernel-kvmsmall-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"product_id": "kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-59.5.1.x86_64",
"product": {
"name": "kernel-obs-build-5.3.18-59.5.1.x86_64",
"product_id": "kernel-obs-build-5.3.18-59.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-59.5.1.x86_64",
"product": {
"name": "kernel-obs-qa-5.3.18-59.5.1.x86_64",
"product_id": "kernel-obs-qa-5.3.18-59.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-preempt-5.3.18-59.5.2.x86_64",
"product_id": "kernel-preempt-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"product_id": "kernel-preempt-devel-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"product_id": "kernel-preempt-extra-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"product_id": "kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"product_id": "kernel-preempt-optional-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-59.5.1.x86_64",
"product": {
"name": "kernel-syms-5.3.18-59.5.1.x86_64",
"product_id": "kernel-syms-5.3.18-59.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"product": {
"name": "kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"product_id": "kselftests-kmp-default-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"product_id": "kselftests-kmp-preempt-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"product_id": "ocfs2-kmp-default-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"product_id": "ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"product_id": "reiserfs-kmp-default-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64",
"product_id": "reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64"
},
"product_reference": "cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-59.5.2.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le"
},
"product_reference": "cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-59.5.2.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x"
},
"product_reference": "cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-59.5.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64"
},
"product_reference": "cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64"
},
"product_reference": "cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-64kb-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64"
},
"product_reference": "dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64"
},
"product_reference": "dlm-kmp-default-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-59.5.2.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le"
},
"product_reference": "dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-59.5.2.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x"
},
"product_reference": "dlm-kmp-default-5.3.18-59.5.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-59.5.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64"
},
"product_reference": "dlm-kmp-default-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-preempt-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64"
},
"product_reference": "dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-preempt-5.3.18-59.5.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64"
},
"product_reference": "dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-64kb-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64"
},
"product_reference": "gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64"
},
"product_reference": "gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-59.5.2.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le"
},
"product_reference": "gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-59.5.2.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x"
},
"product_reference": "gfs2-kmp-default-5.3.18-59.5.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-59.5.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64"
},
"product_reference": "gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-preempt-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64"
},
"product_reference": "gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-preempt-5.3.18-59.5.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64"
},
"product_reference": "gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64"
},
"product_reference": "kernel-64kb-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64"
},
"product_reference": "kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-extra-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64"
},
"product_reference": "kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64"
},
"product_reference": "kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-optional-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64"
},
"product_reference": "kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-5.3.18-59.5.2.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le"
},
"product_reference": "kernel-debug-5.3.18-59.5.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-5.3.18-59.5.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64"
},
"product_reference": "kernel-debug-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-5.3.18-59.5.2.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le"
},
"product_reference": "kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-5.3.18-59.5.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64"
},
"product_reference": "kernel-debug-devel-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le"
},
"product_reference": "kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64"
},
"product_reference": "kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64"
},
"product_reference": "kernel-default-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-59.5.2.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le"
},
"product_reference": "kernel-default-5.3.18-59.5.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-59.5.2.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x"
},
"product_reference": "kernel-default-5.3.18-59.5.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-59.5.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64"
},
"product_reference": "kernel-default-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le"
},
"product_reference": "kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-59.5.2.18.2.2.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x"
},
"product_reference": "kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64"
},
"product_reference": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le"
},
"product_reference": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x"
},
"product_reference": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64"
},
"product_reference": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64"
},
"product_reference": "kernel-default-devel-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-59.5.2.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le"
},
"product_reference": "kernel-default-devel-5.3.18-59.5.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-59.5.2.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x"
},
"product_reference": "kernel-default-devel-5.3.18-59.5.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-59.5.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64"
},
"product_reference": "kernel-default-extra-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.3.18-59.5.2.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le"
},
"product_reference": "kernel-default-extra-5.3.18-59.5.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.3.18-59.5.2.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x"
},
"product_reference": "kernel-default-extra-5.3.18-59.5.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.3.18-59.5.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64"
},
"product_reference": "kernel-default-extra-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64"
},
"product_reference": "kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-59.5.2.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le"
},
"product_reference": "kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-59.5.2.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x"
},
"product_reference": "kernel-default-livepatch-5.3.18-59.5.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-59.5.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64"
},
"product_reference": "kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-59.5.2.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64"
},
"product_reference": "kernel-default-optional-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-5.3.18-59.5.2.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le"
},
"product_reference": "kernel-default-optional-5.3.18-59.5.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-5.3.18-59.5.2.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x"
},
"product_reference": "kernel-default-optional-5.3.18-59.5.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-5.3.18-59.5.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64"
},
"product_reference": "kernel-default-optional-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-59.5.2.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch"
},
"product_reference": "kernel-devel-5.3.18-59.5.2.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-59.5.2.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch"
},
"product_reference": "kernel-docs-5.3.18-59.5.2.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-html-5.3.18-59.5.2.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch"
},
"product_reference": "kernel-docs-html-5.3.18-59.5.2.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-5.3.18-59.5.2.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le"
},
"product_reference": "kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-5.3.18-59.5.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64"
},
"product_reference": "kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le"
},
"product_reference": "kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64"
},
"product_reference": "kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le"
},
"product_reference": "kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64"
},
"product_reference": "kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-59.5.2.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch"
},
"product_reference": "kernel-macros-5.3.18-59.5.2.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-59.5.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64"
},
"product_reference": "kernel-obs-build-5.3.18-59.5.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-59.5.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le"
},
"product_reference": "kernel-obs-build-5.3.18-59.5.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-59.5.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x"
},
"product_reference": "kernel-obs-build-5.3.18-59.5.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-59.5.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-59.5.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-5.3.18-59.5.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64"
},
"product_reference": "kernel-obs-qa-5.3.18-59.5.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-5.3.18-59.5.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le"
},
"product_reference": "kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-5.3.18-59.5.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x"
},
"product_reference": "kernel-obs-qa-5.3.18-59.5.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-5.3.18-59.5.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64"
},
"product_reference": "kernel-obs-qa-5.3.18-59.5.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64"
},
"product_reference": "kernel-preempt-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-59.5.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64"
},
"product_reference": "kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-59.5.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-extra-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64"
},
"product_reference": "kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-extra-5.3.18-59.5.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
},
"product_reference": "kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64"
},
"product_reference": "kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64"
},
"product_reference": "kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-optional-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64"
},
"product_reference": "kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-optional-5.3.18-59.5.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64"
},
"product_reference": "kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-59.5.2.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch"
},
"product_reference": "kernel-source-5.3.18-59.5.2.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-5.3.18-59.5.2.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch"
},
"product_reference": "kernel-source-vanilla-5.3.18-59.5.2.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-59.5.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64"
},
"product_reference": "kernel-syms-5.3.18-59.5.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-59.5.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le"
},
"product_reference": "kernel-syms-5.3.18-59.5.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-59.5.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x"
},
"product_reference": "kernel-syms-5.3.18-59.5.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-59.5.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-59.5.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-5.3.18-59.5.2.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x"
},
"product_reference": "kernel-zfcpdump-5.3.18-59.5.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-64kb-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64"
},
"product_reference": "kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64"
},
"product_reference": "kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-5.3.18-59.5.2.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le"
},
"product_reference": "kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-5.3.18-59.5.2.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x"
},
"product_reference": "kselftests-kmp-default-5.3.18-59.5.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-5.3.18-59.5.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64"
},
"product_reference": "kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-preempt-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64"
},
"product_reference": "kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-preempt-5.3.18-59.5.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64"
},
"product_reference": "kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64"
},
"product_reference": "ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-59.5.2.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le"
},
"product_reference": "ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-59.5.2.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x"
},
"product_reference": "ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-59.5.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64"
},
"product_reference": "ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64"
},
"product_reference": "ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64"
},
"product_reference": "reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-59.5.2.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le"
},
"product_reference": "reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-59.5.2.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x"
},
"product_reference": "reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-59.5.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64"
},
"product_reference": "reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
},
"product_reference": "reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-18814",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18814"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.3.9. There is a use-after-free when aa_label_parse() fails in aa_audit_rule_init() in security/apparmor/audit.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18814",
"url": "https://www.suse.com/security/cve/CVE-2019-18814"
},
{
"category": "external",
"summary": "SUSE Bug 1156256 for CVE-2019-18814",
"url": "https://bugzilla.suse.com/1156256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "moderate"
}
],
"title": "CVE-2019-18814"
},
{
"cve": "CVE-2019-19769",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19769"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel 5.3.10, there is a use-after-free (read) in the perf_trace_lock_acquire function (related to include/trace/events/lock.h).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19769",
"url": "https://www.suse.com/security/cve/CVE-2019-19769"
},
{
"category": "external",
"summary": "SUSE Bug 1159280 for CVE-2019-19769",
"url": "https://bugzilla.suse.com/1159280"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "moderate"
}
],
"title": "CVE-2019-19769"
},
{
"cve": "CVE-2020-24586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24586"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24586",
"url": "https://www.suse.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "moderate"
}
],
"title": "CVE-2020-24586"
},
{
"cve": "CVE-2020-24587",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24587"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24587",
"url": "https://www.suse.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1185862 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "moderate"
}
],
"title": "CVE-2020-24587"
},
{
"cve": "CVE-2020-24588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24588"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24588",
"url": "https://www.suse.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "SUSE Bug 1185861 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1192868"
},
{
"category": "external",
"summary": "SUSE Bug 1199701 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1199701"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "moderate"
}
],
"title": "CVE-2020-24588"
},
{
"cve": "CVE-2020-25670",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25670"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel where refcount leak in llcp_sock_bind() causing use-after-free which might lead to privilege escalations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25670",
"url": "https://www.suse.com/security/cve/CVE-2020-25670"
},
{
"category": "external",
"summary": "SUSE Bug 1178181 for CVE-2020-25670",
"url": "https://bugzilla.suse.com/1178181"
},
{
"category": "external",
"summary": "SUSE Bug 1194680 for CVE-2020-25670",
"url": "https://bugzilla.suse.com/1194680"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "important"
}
],
"title": "CVE-2020-25670"
},
{
"cve": "CVE-2020-25671",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25671"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel, where a refcount leak in llcp_sock_connect() causing use-after-free which might lead to privilege escalations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25671",
"url": "https://www.suse.com/security/cve/CVE-2020-25671"
},
{
"category": "external",
"summary": "SUSE Bug 1178181 for CVE-2020-25671",
"url": "https://bugzilla.suse.com/1178181"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "important"
}
],
"title": "CVE-2020-25671"
},
{
"cve": "CVE-2020-25672",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25672"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak vulnerability was found in Linux kernel in llcp_sock_connect",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25672",
"url": "https://www.suse.com/security/cve/CVE-2020-25672"
},
{
"category": "external",
"summary": "SUSE Bug 1178181 for CVE-2020-25672",
"url": "https://bugzilla.suse.com/1178181"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "important"
}
],
"title": "CVE-2020-25672"
},
{
"cve": "CVE-2020-25673",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25673"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux kernel where non-blocking socket in llcp_sock_connect() leads to leak and eventually hanging-up the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25673",
"url": "https://www.suse.com/security/cve/CVE-2020-25673"
},
{
"category": "external",
"summary": "SUSE Bug 1178181 for CVE-2020-25673",
"url": "https://bugzilla.suse.com/1178181"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "important"
}
],
"title": "CVE-2020-25673"
},
{
"cve": "CVE-2020-26139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26139"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26139",
"url": "https://www.suse.com/security/cve/CVE-2020-26139"
},
{
"category": "external",
"summary": "SUSE Bug 1186062 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "moderate"
}
],
"title": "CVE-2020-26139"
},
{
"cve": "CVE-2020-26141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26141"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26141",
"url": "https://www.suse.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "SUSE Bug 1185987 for CVE-2020-26141",
"url": "https://bugzilla.suse.com/1185987"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "moderate"
}
],
"title": "CVE-2020-26141"
},
{
"cve": "CVE-2020-26145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26145"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26145",
"url": "https://www.suse.com/security/cve/CVE-2020-26145"
},
{
"category": "external",
"summary": "SUSE Bug 1185860 for CVE-2020-26145",
"url": "https://bugzilla.suse.com/1185860"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "moderate"
}
],
"title": "CVE-2020-26145"
},
{
"cve": "CVE-2020-26147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26147"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26147",
"url": "https://www.suse.com/security/cve/CVE-2020-26147"
},
{
"category": "external",
"summary": "SUSE Bug 1233723 for CVE-2020-26147",
"url": "https://bugzilla.suse.com/1233723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "moderate"
}
],
"title": "CVE-2020-26147"
},
{
"cve": "CVE-2020-27170",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-27170"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.11.8. kernel/bpf/verifier.c performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory, aka CID-f232326f6966. This affects pointer types that do not define a ptr_limit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-27170",
"url": "https://www.suse.com/security/cve/CVE-2020-27170"
},
{
"category": "external",
"summary": "SUSE Bug 1183686 for CVE-2020-27170",
"url": "https://bugzilla.suse.com/1183686"
},
{
"category": "external",
"summary": "SUSE Bug 1183775 for CVE-2020-27170",
"url": "https://bugzilla.suse.com/1183775"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "moderate"
}
],
"title": "CVE-2020-27170"
},
{
"cve": "CVE-2020-27171",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-27171"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.11.8. kernel/bpf/verifier.c has an off-by-one error (with a resultant integer underflow) affecting out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory, aka CID-10d2bb2e6b1d.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-27171",
"url": "https://www.suse.com/security/cve/CVE-2020-27171"
},
{
"category": "external",
"summary": "SUSE Bug 1183686 for CVE-2020-27171",
"url": "https://bugzilla.suse.com/1183686"
},
{
"category": "external",
"summary": "SUSE Bug 1183775 for CVE-2020-27171",
"url": "https://bugzilla.suse.com/1183775"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "moderate"
}
],
"title": "CVE-2020-27171"
},
{
"cve": "CVE-2020-27673",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-27673"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. Guest OS users can cause a denial of service (host OS hang) via a high rate of events to dom0, aka CID-e99502f76271.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-27673",
"url": "https://www.suse.com/security/cve/CVE-2020-27673"
},
{
"category": "external",
"summary": "SUSE Bug 1177411 for CVE-2020-27673",
"url": "https://bugzilla.suse.com/1177411"
},
{
"category": "external",
"summary": "SUSE Bug 1184583 for CVE-2020-27673",
"url": "https://bugzilla.suse.com/1184583"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "moderate"
}
],
"title": "CVE-2020-27673"
},
{
"cve": "CVE-2020-27815",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-27815"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the JFS filesystem code in the Linux Kernel which allows a local attacker with the ability to set extended attributes to panic the system, causing memory corruption or escalating privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-27815",
"url": "https://www.suse.com/security/cve/CVE-2020-27815"
},
{
"category": "external",
"summary": "SUSE Bug 1179454 for CVE-2020-27815",
"url": "https://bugzilla.suse.com/1179454"
},
{
"category": "external",
"summary": "SUSE Bug 1179458 for CVE-2020-27815",
"url": "https://bugzilla.suse.com/1179458"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "important"
}
],
"title": "CVE-2020-27815"
},
{
"cve": "CVE-2020-35519",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-35519"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds (OOB) memory access flaw was found in x25_bind in net/x25/af_x25.c in the Linux kernel version v5.12-rc5. A bounds check failure allows a local attacker with a user account on the system to gain access to out-of-bounds memory, leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-35519",
"url": "https://www.suse.com/security/cve/CVE-2020-35519"
},
{
"category": "external",
"summary": "SUSE Bug 1183696 for CVE-2020-35519",
"url": "https://bugzilla.suse.com/1183696"
},
{
"category": "external",
"summary": "SUSE Bug 1184953 for CVE-2020-35519",
"url": "https://bugzilla.suse.com/1184953"
},
{
"category": "external",
"summary": "SUSE Bug 1211495 for CVE-2020-35519",
"url": "https://bugzilla.suse.com/1211495"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "important"
}
],
"title": "CVE-2020-35519"
},
{
"cve": "CVE-2020-36310",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36310"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.8. arch/x86/kvm/svm/svm.c allows a set_memory_region_test infinite loop for certain nested page faults, aka CID-e72436bc3a52.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36310",
"url": "https://www.suse.com/security/cve/CVE-2020-36310"
},
{
"category": "external",
"summary": "SUSE Bug 1184512 for CVE-2020-36310",
"url": "https://bugzilla.suse.com/1184512"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "moderate"
}
],
"title": "CVE-2020-36310"
},
{
"cve": "CVE-2020-36311",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36311"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.9. arch/x86/kvm/svm/sev.c allows attackers to cause a denial of service (soft lockup) by triggering destruction of a large SEV VM (which requires unregistering many encrypted regions), aka CID-7be74942f184.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36311",
"url": "https://www.suse.com/security/cve/CVE-2020-36311"
},
{
"category": "external",
"summary": "SUSE Bug 1184511 for CVE-2020-36311",
"url": "https://bugzilla.suse.com/1184511"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "moderate"
}
],
"title": "CVE-2020-36311"
},
{
"cve": "CVE-2020-36312",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36312"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.8.10. virt/kvm/kvm_main.c has a kvm_io_bus_unregister_dev memory leak upon a kmalloc failure, aka CID-f65886606c2d.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36312",
"url": "https://www.suse.com/security/cve/CVE-2020-36312"
},
{
"category": "external",
"summary": "SUSE Bug 1184509 for CVE-2020-36312",
"url": "https://bugzilla.suse.com/1184509"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "low"
}
],
"title": "CVE-2020-36312"
},
{
"cve": "CVE-2020-36322",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36322"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the FUSE filesystem implementation in the Linux kernel before 5.10.6, aka CID-5d069dbe8aaf. fuse_do_getattr() calls make_bad_inode() in inappropriate situations, causing a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36322",
"url": "https://www.suse.com/security/cve/CVE-2020-36322"
},
{
"category": "external",
"summary": "SUSE Bug 1184211 for CVE-2020-36322",
"url": "https://bugzilla.suse.com/1184211"
},
{
"category": "external",
"summary": "SUSE Bug 1184952 for CVE-2020-36322",
"url": "https://bugzilla.suse.com/1184952"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-36322",
"url": "https://bugzilla.suse.com/1189302"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "important"
}
],
"title": "CVE-2020-36322"
},
{
"cve": "CVE-2021-20268",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20268"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds access flaw was found in the Linux kernel\u0027s implementation of the eBPF code verifier in the way a user running the eBPF script calls dev_map_init_map or sock_map_alloc. This flaw allows a local user to crash the system or possibly escalate their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20268",
"url": "https://www.suse.com/security/cve/CVE-2021-20268"
},
{
"category": "external",
"summary": "SUSE Bug 1183077 for CVE-2021-20268",
"url": "https://bugzilla.suse.com/1183077"
},
{
"category": "external",
"summary": "SUSE Bug 1183095 for CVE-2021-20268",
"url": "https://bugzilla.suse.com/1183095"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "important"
}
],
"title": "CVE-2021-20268"
},
{
"cve": "CVE-2021-23134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23134"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23134",
"url": "https://www.suse.com/security/cve/CVE-2021-23134"
},
{
"category": "external",
"summary": "SUSE Bug 1186060 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "external",
"summary": "SUSE Bug 1186061 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "external",
"summary": "SUSE Bug 1220739 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1220739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "important"
}
],
"title": "CVE-2021-23134"
},
{
"cve": "CVE-2021-27363",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-27363"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.3. A kernel pointer leak can be used to determine the address of the iscsi_transport structure. When an iSCSI transport is registered with the iSCSI subsystem, the transport\u0027s handle is available to unprivileged users via the sysfs file system, at /sys/class/iscsi_transport/$TRANSPORT_NAME/handle. When read, the show_transport_handle function (in drivers/scsi/scsi_transport_iscsi.c) is called, which leaks the handle. This handle is actually the pointer to an iscsi_transport struct in the kernel module\u0027s global variables.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-27363",
"url": "https://www.suse.com/security/cve/CVE-2021-27363"
},
{
"category": "external",
"summary": "SUSE Bug 1182716 for CVE-2021-27363",
"url": "https://bugzilla.suse.com/1182716"
},
{
"category": "external",
"summary": "SUSE Bug 1182717 for CVE-2021-27363",
"url": "https://bugzilla.suse.com/1182717"
},
{
"category": "external",
"summary": "SUSE Bug 1183120 for CVE-2021-27363",
"url": "https://bugzilla.suse.com/1183120"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-27363",
"url": "https://bugzilla.suse.com/1200084"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "important"
}
],
"title": "CVE-2021-27363"
},
{
"cve": "CVE-2021-27364",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-27364"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.3. drivers/scsi/scsi_transport_iscsi.c is adversely affected by the ability of an unprivileged user to craft Netlink messages.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-27364",
"url": "https://www.suse.com/security/cve/CVE-2021-27364"
},
{
"category": "external",
"summary": "SUSE Bug 1182715 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1182715"
},
{
"category": "external",
"summary": "SUSE Bug 1182716 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1182716"
},
{
"category": "external",
"summary": "SUSE Bug 1182717 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1182717"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "important"
}
],
"title": "CVE-2021-27364"
},
{
"cve": "CVE-2021-27365",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-27365"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.3. Certain iSCSI data structures do not have appropriate length constraints or checks, and can exceed the PAGE_SIZE value. An unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-27365",
"url": "https://www.suse.com/security/cve/CVE-2021-27365"
},
{
"category": "external",
"summary": "SUSE Bug 1182712 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1182712"
},
{
"category": "external",
"summary": "SUSE Bug 1182715 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1182715"
},
{
"category": "external",
"summary": "SUSE Bug 1183491 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1183491"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "important"
}
],
"title": "CVE-2021-27365"
},
{
"cve": "CVE-2021-28038",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28038"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.3, as used with Xen PV. A certain part of the netback driver lacks necessary treatment of errors such as failed memory allocations (as a result of changes to the handling of grant mapping errors). A host OS denial of service may occur during misbehavior of a networking frontend driver. NOTE: this issue exists because of an incomplete fix for CVE-2021-26931.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28038",
"url": "https://www.suse.com/security/cve/CVE-2021-28038"
},
{
"category": "external",
"summary": "SUSE Bug 1183022 for CVE-2021-28038",
"url": "https://bugzilla.suse.com/1183022"
},
{
"category": "external",
"summary": "SUSE Bug 1183069 for CVE-2021-28038",
"url": "https://bugzilla.suse.com/1183069"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "moderate"
}
],
"title": "CVE-2021-28038"
},
{
"cve": "CVE-2021-28375",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28375"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.6. fastrpc_internal_invoke in drivers/misc/fastrpc.c does not prevent user applications from sending kernel RPC messages, aka CID-20c40794eb85. This is a related issue to CVE-2019-2308.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28375",
"url": "https://www.suse.com/security/cve/CVE-2021-28375"
},
{
"category": "external",
"summary": "SUSE Bug 1183596 for CVE-2021-28375",
"url": "https://bugzilla.suse.com/1183596"
},
{
"category": "external",
"summary": "SUSE Bug 1184955 for CVE-2021-28375",
"url": "https://bugzilla.suse.com/1184955"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "important"
}
],
"title": "CVE-2021-28375"
},
{
"cve": "CVE-2021-28660",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28660"
}
],
"notes": [
{
"category": "general",
"text": "rtw_wx_set_scan in drivers/staging/rtl8188eu/os_dep/ioctl_linux.c in the Linux kernel through 5.11.6 allows writing beyond the end of the -\u003essid[] array. NOTE: from the perspective of kernel.org releases, CVE IDs are not normally used for drivers/staging/* (unfinished work); however, system integrators may have situations in which a drivers/staging issue is relevant to their own customer base.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28660",
"url": "https://www.suse.com/security/cve/CVE-2021-28660"
},
{
"category": "external",
"summary": "SUSE Bug 1183593 for CVE-2021-28660",
"url": "https://bugzilla.suse.com/1183593"
},
{
"category": "external",
"summary": "SUSE Bug 1183658 for CVE-2021-28660",
"url": "https://bugzilla.suse.com/1183658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "important"
}
],
"title": "CVE-2021-28660"
},
{
"cve": "CVE-2021-28688",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28688"
}
],
"notes": [
{
"category": "general",
"text": "The fix for XSA-365 includes initialization of pointers such that subsequent cleanup code wouldn\u0027t use uninitialized or stale values. This initialization went too far and may under certain conditions also overwrite pointers which are in need of cleaning up. The lack of cleanup would result in leaking persistent grants. The leak in turn would prevent fully cleaning up after a respective guest has died, leaving around zombie domains. All Linux versions having the fix for XSA-365 applied are vulnerable. XSA-365 was classified to affect versions back to at least 3.11.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28688",
"url": "https://www.suse.com/security/cve/CVE-2021-28688"
},
{
"category": "external",
"summary": "SUSE Bug 1183646 for CVE-2021-28688",
"url": "https://bugzilla.suse.com/1183646"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "moderate"
}
],
"title": "CVE-2021-28688"
},
{
"cve": "CVE-2021-28950",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28950"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in fs/fuse/fuse_i.h in the Linux kernel before 5.11.8. A \"stall on CPU\" can occur because a retry loop continually finds the same bad inode, aka CID-775c5033a0d1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28950",
"url": "https://www.suse.com/security/cve/CVE-2021-28950"
},
{
"category": "external",
"summary": "SUSE Bug 1184194 for CVE-2021-28950",
"url": "https://bugzilla.suse.com/1184194"
},
{
"category": "external",
"summary": "SUSE Bug 1184211 for CVE-2021-28950",
"url": "https://bugzilla.suse.com/1184211"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "moderate"
}
],
"title": "CVE-2021-28950"
},
{
"cve": "CVE-2021-28952",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28952"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.8. The sound/soc/qcom/sdm845.c soundwire device driver has a buffer overflow when an unexpected port ID number is encountered, aka CID-1c668e1c0a0f. (This has been fixed in 5.12-rc4.)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28952",
"url": "https://www.suse.com/security/cve/CVE-2021-28952"
},
{
"category": "external",
"summary": "SUSE Bug 1184197 for CVE-2021-28952",
"url": "https://bugzilla.suse.com/1184197"
},
{
"category": "external",
"summary": "SUSE Bug 1184199 for CVE-2021-28952",
"url": "https://bugzilla.suse.com/1184199"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "important"
}
],
"title": "CVE-2021-28952"
},
{
"cve": "CVE-2021-28964",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28964"
}
],
"notes": [
{
"category": "general",
"text": "A race condition was discovered in get_old_root in fs/btrfs/ctree.c in the Linux kernel through 5.11.8. It allows attackers to cause a denial of service (BUG) because of a lack of locking on an extent buffer before a cloning operation, aka CID-dbcc7d57bffc.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28964",
"url": "https://www.suse.com/security/cve/CVE-2021-28964"
},
{
"category": "external",
"summary": "SUSE Bug 1184193 for CVE-2021-28964",
"url": "https://bugzilla.suse.com/1184193"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "moderate"
}
],
"title": "CVE-2021-28964"
},
{
"cve": "CVE-2021-28971",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28971"
}
],
"notes": [
{
"category": "general",
"text": "In intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c in the Linux kernel through 5.11.8 on some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled, aka CID-d88d05a9e0b6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28971",
"url": "https://www.suse.com/security/cve/CVE-2021-28971"
},
{
"category": "external",
"summary": "SUSE Bug 1184196 for CVE-2021-28971",
"url": "https://bugzilla.suse.com/1184196"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "moderate"
}
],
"title": "CVE-2021-28971"
},
{
"cve": "CVE-2021-28972",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28972"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/pci/hotplug/rpadlpar_sysfs.c in the Linux kernel through 5.11.8, the RPA PCI Hotplug driver has a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly. This occurs because add_slot_store and remove_slot_store mishandle drc_name \u0027\\0\u0027 termination, aka CID-cc7a0bb058b8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28972",
"url": "https://www.suse.com/security/cve/CVE-2021-28972"
},
{
"category": "external",
"summary": "SUSE Bug 1184198 for CVE-2021-28972",
"url": "https://bugzilla.suse.com/1184198"
},
{
"category": "external",
"summary": "SUSE Bug 1220060 for CVE-2021-28972",
"url": "https://bugzilla.suse.com/1220060"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "moderate"
}
],
"title": "CVE-2021-28972"
},
{
"cve": "CVE-2021-29154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-29154"
}
],
"notes": [
{
"category": "general",
"text": "BPF JIT compilers in the Linux kernel through 5.11.12 have incorrect computation of branch displacements, allowing them to execute arbitrary code within the kernel context. This affects arch/x86/net/bpf_jit_comp.c and arch/x86/net/bpf_jit_comp32.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-29154",
"url": "https://www.suse.com/security/cve/CVE-2021-29154"
},
{
"category": "external",
"summary": "SUSE Bug 1184391 for CVE-2021-29154",
"url": "https://bugzilla.suse.com/1184391"
},
{
"category": "external",
"summary": "SUSE Bug 1184710 for CVE-2021-29154",
"url": "https://bugzilla.suse.com/1184710"
},
{
"category": "external",
"summary": "SUSE Bug 1186408 for CVE-2021-29154",
"url": "https://bugzilla.suse.com/1186408"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "important"
}
],
"title": "CVE-2021-29154"
},
{
"cve": "CVE-2021-29155",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-29155"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.x. kernel/bpf/verifier.c performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory. Specifically, for sequences of pointer arithmetic operations, the pointer modification performed by the first operation is not correctly accounted for when restricting subsequent operations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-29155",
"url": "https://www.suse.com/security/cve/CVE-2021-29155"
},
{
"category": "external",
"summary": "SUSE Bug 1184942 for CVE-2021-29155",
"url": "https://bugzilla.suse.com/1184942"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "moderate"
}
],
"title": "CVE-2021-29155"
},
{
"cve": "CVE-2021-29264",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-29264"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.10. drivers/net/ethernet/freescale/gianfar.c in the Freescale Gianfar Ethernet driver allows attackers to cause a system crash because a negative fragment size is calculated in situations involving an rx queue overrun when jumbo packets are used and NAPI is enabled, aka CID-d8861bab48b6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-29264",
"url": "https://www.suse.com/security/cve/CVE-2021-29264"
},
{
"category": "external",
"summary": "SUSE Bug 1184168 for CVE-2021-29264",
"url": "https://bugzilla.suse.com/1184168"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "moderate"
}
],
"title": "CVE-2021-29264"
},
{
"cve": "CVE-2021-29265",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-29265"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.11.7. usbip_sockfd_store in drivers/usb/usbip/stub_dev.c allows attackers to cause a denial of service (GPF) because the stub-up sequence has race conditions during an update of the local and shared status, aka CID-9380afd6df70.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-29265",
"url": "https://www.suse.com/security/cve/CVE-2021-29265"
},
{
"category": "external",
"summary": "SUSE Bug 1184167 for CVE-2021-29265",
"url": "https://bugzilla.suse.com/1184167"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "moderate"
}
],
"title": "CVE-2021-29265"
},
{
"cve": "CVE-2021-29647",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-29647"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.11.11. qrtr_recvmsg in net/qrtr/qrtr.c allows attackers to obtain sensitive information from kernel memory because of a partially uninitialized data structure, aka CID-50535249f624.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-29647",
"url": "https://www.suse.com/security/cve/CVE-2021-29647"
},
{
"category": "external",
"summary": "SUSE Bug 1184192 for CVE-2021-29647",
"url": "https://bugzilla.suse.com/1184192"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "moderate"
}
],
"title": "CVE-2021-29647"
},
{
"cve": "CVE-2021-29650",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-29650"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.11.11. The netfilter subsystem allows attackers to cause a denial of service (panic) because net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h lack a full memory barrier upon the assignment of a new table value, aka CID-175e476b8cdf.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-29650",
"url": "https://www.suse.com/security/cve/CVE-2021-29650"
},
{
"category": "external",
"summary": "SUSE Bug 1184208 for CVE-2021-29650",
"url": "https://bugzilla.suse.com/1184208"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "moderate"
}
],
"title": "CVE-2021-29650"
},
{
"cve": "CVE-2021-30002",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30002"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.11.3 when a webcam device exists. video_usercopy in drivers/media/v4l2-core/v4l2-ioctl.c has a memory leak for large arguments, aka CID-fb18802a338b.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30002",
"url": "https://www.suse.com/security/cve/CVE-2021-30002"
},
{
"category": "external",
"summary": "SUSE Bug 1184120 for CVE-2021-30002",
"url": "https://bugzilla.suse.com/1184120"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "moderate"
}
],
"title": "CVE-2021-30002"
},
{
"cve": "CVE-2021-32399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32399"
}
],
"notes": [
{
"category": "general",
"text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32399",
"url": "https://www.suse.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "SUSE Bug 1184611 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "external",
"summary": "SUSE Bug 1185898 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "external",
"summary": "SUSE Bug 1185899 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "important"
}
],
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-33034",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33034"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33034",
"url": "https://www.suse.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "SUSE Bug 1186111 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "external",
"summary": "SUSE Bug 1186285 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "important"
}
],
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-33200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33200"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-\u003ealu_limit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33200",
"url": "https://www.suse.com/security/cve/CVE-2021-33200"
},
{
"category": "external",
"summary": "SUSE Bug 1186484 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "external",
"summary": "SUSE Bug 1186498 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "important"
}
],
"title": "CVE-2021-33200"
},
{
"cve": "CVE-2021-3428",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3428"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel. A denial of service problem is identified if an extent tree is corrupted in a crafted ext4 filesystem in fs/ext4/extents.c in ext4_es_cache_extent. Fabricating an integer overflow, A local attacker with a special user privilege may cause a system crash problem which can lead to an availability threat.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3428",
"url": "https://www.suse.com/security/cve/CVE-2021-3428"
},
{
"category": "external",
"summary": "SUSE Bug 1173485 for CVE-2021-3428",
"url": "https://bugzilla.suse.com/1173485"
},
{
"category": "external",
"summary": "SUSE Bug 1183509 for CVE-2021-3428",
"url": "https://bugzilla.suse.com/1183509"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "moderate"
}
],
"title": "CVE-2021-3428"
},
{
"cve": "CVE-2021-3444",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3444"
}
],
"notes": [
{
"category": "general",
"text": "The bpf verifier in the Linux kernel did not properly handle mod32 destination register truncation when the source register was known to be 0. A local attacker with the ability to load bpf programs could use this gain out-of-bounds reads in kernel memory leading to information disclosure (kernel memory), and possibly out-of-bounds writes that could potentially lead to code execution. This issue was addressed in the upstream kernel in commit 9b00f1b78809 (\"bpf: Fix truncation handling for mod32 dst reg wrt zero\") and in Linux stable kernels 5.11.2, 5.10.19, and 5.4.101.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3444",
"url": "https://www.suse.com/security/cve/CVE-2021-3444"
},
{
"category": "external",
"summary": "SUSE Bug 1184170 for CVE-2021-3444",
"url": "https://bugzilla.suse.com/1184170"
},
{
"category": "external",
"summary": "SUSE Bug 1184171 for CVE-2021-3444",
"url": "https://bugzilla.suse.com/1184171"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "important"
}
],
"title": "CVE-2021-3444"
},
{
"cve": "CVE-2021-3483",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3483"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Nosy driver in the Linux kernel. This issue allows a device to be inserted twice into a doubly-linked list, leading to a use-after-free when one of these devices is removed. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. Versions before kernel 5.12-rc6 are affected",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3483",
"url": "https://www.suse.com/security/cve/CVE-2021-3483"
},
{
"category": "external",
"summary": "SUSE Bug 1184393 for CVE-2021-3483",
"url": "https://bugzilla.suse.com/1184393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "moderate"
}
],
"title": "CVE-2021-3483"
},
{
"cve": "CVE-2021-3489",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3489"
}
],
"notes": [
{
"category": "general",
"text": "The eBPF RINGBUF bpf_ringbuf_reserve() function in the Linux kernel did not check that the allocated size was smaller than the ringbuf size, allowing an attacker to perform out-of-bounds writes within the kernel and therefore, arbitrary code execution. This issue was fixed via commit 4b81ccebaeee (\"bpf, ringbuf: Deny reserve of buffers larger than ringbuf\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced via 457f44363a88 (\"bpf: Implement BPF ring buffer and verifier support for it\") (v5.8-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3489",
"url": "https://www.suse.com/security/cve/CVE-2021-3489"
},
{
"category": "external",
"summary": "SUSE Bug 1185640 for CVE-2021-3489",
"url": "https://bugzilla.suse.com/1185640"
},
{
"category": "external",
"summary": "SUSE Bug 1185856 for CVE-2021-3489",
"url": "https://bugzilla.suse.com/1185856"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "important"
}
],
"title": "CVE-2021-3489"
},
{
"cve": "CVE-2021-3490",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3490"
}
],
"notes": [
{
"category": "general",
"text": "The eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) in the Linux kernel did not properly update 32-bit bounds, which could be turned into out of bounds reads and writes in the Linux kernel and therefore, arbitrary code execution. This issue was fixed via commit 049c4e13714e (\"bpf: Fix alu32 const subreg bound tracking on bitwise operations\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. The AND/OR issues were introduced by commit 3f50f132d840 (\"bpf: Verifier, do explicit ALU32 bounds tracking\") (5.7-rc1) and the XOR variant was introduced by 2921c90d4718 (\"bpf:Fix a verifier failure with xor\") ( 5.10-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3490",
"url": "https://www.suse.com/security/cve/CVE-2021-3490"
},
{
"category": "external",
"summary": "SUSE Bug 1185641 for CVE-2021-3490",
"url": "https://bugzilla.suse.com/1185641"
},
{
"category": "external",
"summary": "SUSE Bug 1185796 for CVE-2021-3490",
"url": "https://bugzilla.suse.com/1185796"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "important"
}
],
"title": "CVE-2021-3490"
},
{
"cve": "CVE-2021-3491",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3491"
}
],
"notes": [
{
"category": "general",
"text": "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3491",
"url": "https://www.suse.com/security/cve/CVE-2021-3491"
},
{
"category": "external",
"summary": "SUSE Bug 1185642 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "external",
"summary": "SUSE Bug 1187090 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1187090"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "important"
}
],
"title": "CVE-2021-3491"
}
]
}
opensuse-su-2021:0947-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP2 RT kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-33200: Enforcing incorrect limits for pointer arithmetic operations by the BPF verifier could be abused to perform out-of-bounds reads and writes in kernel memory (bsc#1186484).\n- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values. (bsc#1186111)\n- CVE-2020-26139: Fixed a denial-of-service when an Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. (bnc#1186062)\n- CVE-2021-23134: A Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges. (bnc#1186060)\n- CVE-2021-3491: Fixed a potential heap overflow in mem_rw(). This vulnerability is related to the PROVIDE_BUFFERS operation, which allowed the MAX_RW_COUNT limit to be bypassed (bsc#1185642).\n- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).\n- CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances this can be abused to inject arbitrary network packets and/or exfiltrate user data (bnc#1185859).\n- CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed (bnc#1185859 bnc#1185862).\n- CVE-2020-26147: The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments, even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used (bnc#1185859).\n- CVE-2020-24588: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets. (bnc#1185861)\n- CVE-2020-26145: An issue was discovered with Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration. (bnc#1185860)\n- CVE-2020-26141: An issue was discovered in the ALFA driver for AWUS036H, where the Message Integrity Check (authenticity) of fragmented TKIP frames was not verified. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bnc#1185987)\n\nThe following non-security bugs were fixed:\n\n- ACPI / hotplug / PCI: Fix reference count leak in enable_slot() (git-fixes).\n- ACPI: GTDT: Do not corrupt interrupt mappings on watchdow probe failure (git-fixes).\n- ACPI: custom_method: fix a possible memory leak (git-fixes).\n- ACPI: custom_method: fix potential use-after-free issue (git-fixes).\n- ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro (git-fixes).\n- ALSA: bebob: enable to deliver MIDI messages for multiple ports (git-fixes).\n- ALSA: dice: fix stream format at middle sampling rate for Alesis iO 26 (git-fixes).\n- ALSA: dice: fix stream format for TC Electronic Konnekt Live at high sampling transfer frequency (git-fixes).\n- ALSA: firewire-lib: fix calculation for size of IR context payload (git-fixes).\n- ALSA: firewire-lib: fix check for the size of isochronous packet payload (git-fixes).\n- ALSA: hda/conexant: Re-order CX5066 quirk table entries (git-fixes).\n- ALSA: hda/realtek: ALC285 Thinkpad jack pin quirk is unreachable (git-fixes).\n- ALSA: hda/realtek: Add some CLOVE SSIDs of ALC293 (git-fixes).\n- ALSA: hda/realtek: Headphone volume is controlled by Front mixer (git-fixes).\n- ALSA: hda/realtek: reset eapd coeff to default value for alc287 (git-fixes).\n- ALSA: hda: fixup headset for ASUS GU502 laptop (git-fixes).\n- ALSA: hda: generic: change the DAC ctl name for LO+SPK or LO+HP (git-fixes).\n- ALSA: hdsp: do not disable if not enabled (git-fixes).\n- ALSA: hdspm: do not disable if not enabled (git-fixes).\n- ALSA: intel8x0: Do not update period unless prepared (git-fixes).\n- ALSA: line6: Fix racy initialization of LINE6 MIDI (git-fixes).\n- ALSA: rme9652: do not disable if not enabled (git-fixes).\n- ALSA: usb-audio: Validate MS endpoint descriptors (git-fixes).\n- ALSA: usb-audio: fix control-request direction (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix device hang with ehci-pci (git-fixes).\n- ALSA: usb-audio: scarlett2: Improve driver startup messages (git-fixes).\n- ALSA: usb-audio: scarlett2: snd_scarlett_gen2_controls_create() can be static (git-fixes).\n- ARM64: vdso32: Install vdso32 from vdso_install (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for the Chuwi Hi8 tablet (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Enable jack-detect support on Asus T100TAF (git-fixes).\n- ASoC: cs35l33: fix an error code in probe() (git-fixes).\n- ASoC: cs42l42: Regmap must use_single_read/write (git-fixes).\n- ASoC: rsnd: call rsnd_ssi_master_clk_start() from rsnd_ssi_init() (git-fixes).\n- ASoC: rsnd: core: Check convert rate in rsnd_hw_params (git-fixes).\n- ASoC: rt286: Generalize support for ALC3263 codec (git-fixes).\n- ASoC: rt286: Make RT286_SET_GPIO_* readable and writable (git-fixes).\n- Bluetooth: L2CAP: Fix handling LE modes by L2CAP_OPTIONS (git-fixes).\n- Bluetooth: SMP: Fail if remote and local public keys are identical (git-fixes).\n- Bluetooth: Set CONF_NOT_COMPLETE as l2cap_chan default (git-fixes).\n- Bluetooth: check for zapped sk before connecting (git-fixes).\n- Bluetooth: initialize skb_queue_head at l2cap_chan_create() (git-fixes).\n- Drivers: hv: vmbus: Fix Suspend-to-Idle for Generation-2 VM (git-fixes).\n- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185725).\n- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185725).\n- Drivers: hv: vmbus: Use after free in __vmbus_open() (git-fixes).\n- Input: elants_i2c - do not bind to i2c-hid compatible ACPI instantiated devices (git-fixes).\n- Input: silead - add workaround for x86 BIOS-es which bring the chip up in a stuck state (git-fixes).\n- KVM: s390: fix guarded storage control register handling (bsc#1133021).\n- Move upstreamed media fixes into sorted section\n- NFC: nci: fix memory leak in nci_allocate_device (git-fixes).\n- PCI/RCEC: Fix RCiEP device to RCEC association (git-fixes).\n- PCI: Allow VPD access for QLogic ISP2722 (git-fixes).\n- PCI: PM: Do not read power state in pci_enable_device_flags() (git-fixes).\n- PCI: Release OF node in pci_scan_device()\u0027s error path (git-fixes).\n- PCI: endpoint: Fix missing destroy_workqueue() (git-fixes).\n- PCI: iproc: Fix return value of iproc_msi_irq_domain_alloc() (git-fixes).\n- PCI: thunder: Fix compile testing (git-fixes).\n- PM / devfreq: Use more accurate returned new_freq as resume_freq (git-fixes).\n- RDMA/addr: create addr_wq with WQ_MEM_RECLAIM flag (bsc#1183346).\n- RDMA/core: create ib_cm with WQ_MEM_RECLAIM flag (bsc#1183346).\n- RDMA/hns: Delete redundant abnormal interrupt status (git-fixes).\n- RDMA/hns: Delete redundant condition judgment related to eq (git-fixes).\n- RDMA/qedr: Fix error return code in qedr_iw_connect() (jsc#SLE-8215).\n- RDMA/srpt: Fix error return code in srpt_cm_req_recv() (git-fixes).\n- SUNRPC in case of backlog, hand free slots directly to waiting task (bsc#1185428).\n- SUNRPC: More fixes for backlog congestion (bsc#1185428).\n- USB: Add LPM quirk for Lenovo ThinkPad USB-C Dock Gen2 Ethernet (git-fixes).\n- USB: Add reset-resume quirk for WD19\u0027s Realtek Hub (git-fixes).\n- USB: serial: pl2303: add support for PL2303HXN (bsc#1186320).\n- USB: serial: pl2303: fix line-speed handling on newer chips (bsc#1186320).\n- USB: serial: ti_usb_3410_5052: fix TIOCSSERIAL permission check (git-fixes).\n- USB: trancevibrator: fix control-request direction (git-fixes).\n- amdgpu: avoid incorrect %hu format string (git-fixes).\n- arm64/mm: Fix pfn_valid() for ZONE_DEVICE based memory (git-fixes).\n- arm64: Add missing ISB after invalidating TLB in __primary_switch (git-fixes).\n- arm64: avoid -Woverride-init warning (git-fixes).\n- arm64: kasan: fix page_alloc tagging with DEBUG_VIRTUAL (git-fixes).\n- arm64: kdump: update ppos when reading elfcorehdr (git-fixes).\n- arm64: kexec_file: fix memory leakage in create_dtb() when fdt_open_into() fails (git-fixes).\n- arm64: link with -z norelro for LLD or aarch64-elf (git-fixes).\n- arm64: link with -z norelro regardless of CONFIG_RELOCATABLE (git-fixes).\n- arm64: ptrace: Fix seccomp of traced syscall -1 (NO_SYSCALL) (git-fixes).\n- arm64: ptrace: Use NO_SYSCALL instead of -1 in syscall_trace_enter() (git-fixes).\n- arm64: vdso32: make vdso32 install conditional (git-fixes).\n- arm: mm: use __pfn_to_section() to get mem_section (git-fixes).\n- ata: ahci: Disable SXS for Hisilicon Kunpeng920 (git-fixes).\n- blk-iocost: ioc_pd_free() shouldn\u0027t assume irq disabled (git-fixes).\n- blk-mq: Swap two calls in blk_mq_exit_queue() (git-fixes).\n- block/genhd: use atomic_t for disk_event-\u003eblock (bsc#1185497).\n- block: Fix three kernel-doc warnings (git-fixes).\n- block: fix get_max_io_size() (git-fixes).\n- bnxt_en: Fix RX consumer index logic in the error path (git-fixes).\n- bnxt_en: fix ternary sign extension bug in bnxt_show_temp() (git-fixes).\n- bpf: Fix leakage of uninitialized bpf stack under speculation (bsc#1155518).\n- bpf: Fix masking negation logic upon negative dst register (bsc#1155518).\n- btrfs: fix race between transaction aborts and fsyncs leading to use-after-free (bsc#1186441).\n- btrfs: fix race when picking most recent mod log operation for an old root (bsc#1186439).\n- cdc-wdm: untangle a circular dependency between callback and softint (git-fixes).\n- cdrom: gdrom: deallocate struct gdrom_unit fields in remove_gdrom (git-fixes).\n- cdrom: gdrom: initialize global variable at init time (git-fixes).\n- ceph: do not clobber i_snap_caps on non-I_NEW inode (bsc#1186501).\n- ceph: fix inode leak on getattr error in __fh_to_dentry (bsc#1186501).\n- ceph: fix up error handling with snapdirs (bsc#1186501).\n- ceph: only check pool permissions for regular files (bsc#1186501).\n- cfg80211: scan: drop entry from hidden_list on overflow (git-fixes).\n- clk: socfpga: arria10: Fix memory leak of socfpga_clk on error return (git-fixes).\n- cpufreq: intel_pstate: Add Icelake servers support in no-HWP mode (bsc#1185758).\n- crypto: api - check for ERR pointers in crypto_destroy_tfm() (git-fixes).\n- crypto: mips/poly1305 - enable for all MIPS processors (git-fixes).\n- crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init (git-fixes).\n- crypto: qat - Fix a double free in adf_create_ring (git-fixes).\n- crypto: qat - do not release uninitialized resources (git-fixes).\n- crypto: qat - fix error path in adf_isr_resource_alloc() (git-fixes).\n- crypto: qat - fix unmap invalid dma address (git-fixes).\n- crypto: stm32/cryp - Fix PM reference leak on stm32-cryp.c (git-fixes).\n- crypto: stm32/hash - Fix PM reference leak on stm32-hash.c (git-fixes).\n- cxgb4: Fix unintentional sign extension issues (git-fixes).\n- dm: avoid filesystem lookup in dm_get_dev_t() (git-fixes).\n- dmaengine: dw-edma: Fix crash on loading/unloading driver (git-fixes).\n- docs: kernel-parameters: Add gpio_mockup_named_lines (git-fixes).\n- docs: kernel-parameters: Move gpio-mockup for alphabetic order (git-fixes).\n- drivers: hv: Fix whitespace errors (bsc#1185725).\n- drm/amd/display: Fix UBSAN warning for not a valid value for type \u0027_Bool\u0027 (git-fixes).\n- drm/amd/display: Fix two cursor duplication when using overlay (git-fixes).\n- drm/amd/display: Force vsync flip when reconfiguring MPCC (git-fixes).\n- drm/amd/display: Reject non-zero src_y and src_x for video planes (git-fixes).\n- drm/amd/display: fix dml prefetch validation (git-fixes).\n- drm/amd/display: fixed divide by zero kernel crash during dsc enablement (git-fixes).\n- drm/amdgpu : Fix asic reset regression issue introduce by 8f211fe8ac7c4f (git-fixes).\n- drm/amdgpu: disable 3DCGCG on picasso/raven1 to avoid compute hang (git-fixes).\n- drm/amdgpu: fix NULL pointer dereference (git-fixes).\n- drm/amdgpu: mask the xgmi number of hops reported from psp to kfd (git-fixes).\n- drm/amdkfd: Fix cat debugfs hang_hws file causes system crash bug (git-fixes).\n- drm/i915: Avoid div-by-zero on gen2 (git-fixes).\n- drm/meson: fix shutdown crash when component not probed (git-fixes).\n- drm/msm/mdp5: Configure PP_SYNC_HEIGHT to double the vtotal (git-fixes).\n- drm/msm/mdp5: Do not multiply vclk line count by 100 (git-fixes).\n- drm/radeon/dpm: Disable sclk switching on Oland when two 4K 60Hz monitors are connected (git-fixes).\n- drm/radeon: Avoid power table parsing memory leaks (git-fixes).\n- drm/radeon: Fix off-by-one power_state index heap overwrite (git-fixes).\n- drm/vkms: fix misuse of WARN_ON (git-fixes).\n- drm: Added orientation quirk for OneGX1 Pro (git-fixes).\n- ethernet:enic: Fix a use after free bug in enic_hard_start_xmit (git-fixes).\n- extcon: arizona: Fix some issues when HPDET IRQ fires after the jack has been unplugged (git-fixes).\n- extcon: arizona: Fix various races on driver unbind (git-fixes).\n- fbdev: zero-fill colormap in fbcmap.c (git-fixes).\n- firmware: arm_scpi: Prevent the ternary sign expansion bug (git-fixes).\n- fs/epoll: restore waking from ep_done_scan() (bsc#1183868).\n- ftrace: Handle commands when closing set_ftrace_filter file (git-fixes).\n- futex: Change utime parameter to be \u0027const ... *\u0027 (git-fixes).\n- futex: Do not apply time namespace adjustment on FUTEX_LOCK_PI (bsc#1164648).\n- futex: Get rid of the val2 conditional dance (git-fixes).\n- futex: Make syscall entry points less convoluted (git-fixes).\n- genirq/irqdomain: Do not try to free an interrupt that has no (git-fixes)\n- genirq: Disable interrupts for force threaded handlers (git-fixes)\n- genirq: Reduce irqdebug cacheline bouncing (bsc#1185703 ltc#192641).\n- gpio: xilinx: Correct kernel doc for xgpio_probe() (git-fixes).\n- gpiolib: acpi: Add quirk to ignore EC wakeups on Dell Venue 10 Pro 5055 (git-fixes).\n- hrtimer: Update softirq_expires_next correctly after (git-fixes)\n- hwmon: (occ) Fix poll rate limiting (git-fixes).\n- i2c: Add I2C_AQ_NO_REP_START adapter quirk (git-fixes).\n- i2c: bail out early when RDWR parameters are wrong (git-fixes).\n- i2c: i801: Do not generate an interrupt on bus reset (git-fixes).\n- i2c: s3c2410: fix possible NULL pointer deref on read message after write (git-fixes).\n- i2c: sh_mobile: Use new clock calculation formulas for RZ/G2E (git-fixes).\n- i40e: Fix PHY type identifiers for 2.5G and 5G adapters (git-fixes).\n- i40e: Fix use-after-free in i40e_client_subtask() (git-fixes).\n- i40e: fix broken XDP support (git-fixes).\n- i40e: fix the restart auto-negotiation after FEC modified (git-fixes).\n- ibmvfc: Avoid move login if fast fail is enabled (bsc#1185938 ltc#192043).\n- ibmvfc: Handle move login failure (bsc#1185938 ltc#192043).\n- ibmvfc: Reinit target retries (bsc#1185938 ltc#192043).\n- ibmvnic: remove default label from to_string switch (bsc#1152457 ltc#174432 git-fixes).\n- ics932s401: fix broken handling of errors when word reading fails (git-fixes).\n- iio: adc: ad7124: Fix missbalanced regulator enable / disable on error (git-fixes).\n- iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers (git-fixes).\n- iio: adc: ad7768-1: Fix too small buffer passed to iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: ad7793: Add missing error code in ad7793_setup() (git-fixes).\n- iio: gyro: fxas21002c: balance runtime power in error path (git-fixes).\n- iio: gyro: mpu3050: Fix reported temperature value (git-fixes).\n- iio: proximity: pulsedlight: Fix rumtime PM imbalance on error (git-fixes).\n- iio: tsl2583: Fix division by a zero lux_val (git-fixes).\n- intel_th: Consistency and off-by-one fix (git-fixes).\n- iommu/amd: Add support for map/unmap_resource (jsc#ECO-3482).\n- ipc/mqueue, msg, sem: Avoid relying on a stack reference past its expiry (bsc#1185988).\n- ipmi/watchdog: Stop watchdog timer when the current action is \u0027none\u0027 (bsc#1184855).\n- kernel-docs.spec.in: Build using an utf-8 locale. Sphinx cannot handle UTF-8 input in non-UTF-8 locale.\n- leds: lp5523: check return value of lp5xx_read and jump to cleanup code (git-fixes).\n- locking/seqlock: Tweak DEFINE_SEQLOCK() kernel doc (bsc#1176564 bsc#1162702).\n- lpfc: Decouple port_template and vport_template (bsc#185032).\n- mac80211: clear the beacon\u0027s CRC after channel switch (git-fixes).\n- md-cluster: fix use-after-free issue when removing rdev (bsc#1184082).\n- md/raid1: properly indicate failure when ending a failed write request (bsc#1185680).\n- md: do not flush workqueue unconditionally in md_open (bsc#1184081).\n- md: factor out a mddev_find_locked helper from mddev_find (bsc#1184081).\n- md: md_open returns -EBUSY when entering racing area (bsc#1184081).\n- md: split mddev_find (bsc#1184081).\n- media: adv7604: fix possible use-after-free in adv76xx_remove() (git-fixes).\n- media: drivers: media: pci: sta2x11: fix Kconfig dependency on GPIOLIB (git-fixes).\n- media: dvb-usb: fix memory leak in dvb_usb_adapter_init (git-fixes).\n- media: em28xx: fix memory leak (git-fixes).\n- media: gspca/sq905.c: fix uninitialized variable (git-fixes).\n- media: i2c: adv7511-v4l2: fix possible use-after-free in adv7511_remove() (git-fixes).\n- media: i2c: adv7842: fix possible use-after-free in adv7842_remove() (git-fixes).\n- media: i2c: tda1997: Fix possible use-after-free in tda1997x_remove() (git-fixes).\n- media: imx: capture: Return -EPIPE from __capture_legacy_try_fmt() (git-fixes).\n- media: ite-cir: check for receive overflow (git-fixes).\n- media: media/saa7164: fix saa7164_encoder_register() memory leak bugs (git-fixes).\n- media: platform: sti: Fix runtime PM imbalance in regs_show (git-fixes).\n- media: tc358743: fix possible use-after-free in tc358743_remove() (git-fixes).\n- mfd: arizona: Fix rumtime PM imbalance on error (git-fixes).\n- misc/uss720: fix memory leak in uss720_probe (git-fixes).\n- mlxsw: spectrum_mr: Update egress RIF list before route\u0027s action (git-fixes).\n- mm: memcontrol: fix cpuhotplug statistics flushing (bsc#1185606).\n- mmc: block: Update ext_csd.cache_ctrl if it was written (git-fixes).\n- mmc: core: Do a power cycle when the CMD11 fails (git-fixes).\n- mmc: core: Set read only for SD cards with permanent write protect bit (git-fixes).\n- mmc: sdhci-pci-gli: increase 1.8V regulator wait (git-fixes).\n- mmc: sdhci-pci: Add PCI IDs for Intel LKF (git-fixes).\n- mmc: sdhci-pci: Fix initialization of some SD cards for Intel BYT-based controllers (git-fixes).\n- mmc: sdhci: Check for reset prior to DMA address unmap (git-fixes).\n- net, xdp: Update pkt_type if generic XDP changes unicast MAC (git-fixes).\n- net: enetc: fix link error again (git-fixes).\n- net: hns3: Fix for geneve tx checksum bug (git-fixes).\n- net: hns3: add check for HNS3_NIC_STATE_INITED in hns3_reset_notify_up_enet() (git-fixes).\n- net: hns3: clear unnecessary reset request in hclge_reset_rebuild (git-fixes).\n- net: hns3: disable phy loopback setting in hclge_mac_start_phy (git-fixes).\n- net: hns3: fix for vxlan gpe tx checksum bug (git-fixes).\n- net: hns3: fix incorrect configuration for igu_egu_hw_err (git-fixes).\n- net: hns3: initialize the message content in hclge_get_link_mode() (git-fixes).\n- net: hns3: use netif_tx_disable to stop the transmit queue (git-fixes).\n- net: thunderx: Fix unintentional sign extension issue (git-fixes).\n- net: usb: fix memory leak in smsc75xx_bind (git-fixes).\n- net: xfrm: Localize sequence counter per network namespace (bsc#1185696).\n- net: xfrm: Use sequence counter with associated spinlock (bsc#1185696).\n- netdevice: Add missing IFF_PHONY_HEADROOM self-definition (git-fixes).\n- netfilter: conntrack: add new sysctl to disable RST check (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: avoid misleading \u0027invalid\u0027 in log message (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: improve RST handling when tuple is re-used (bsc#1183947 bsc#1185950).\n- nvme-core: add cancel tagset helpers (bsc#1183976).\n- nvme-fabrics: decode host pathing error for connect (bsc#1179827).\n- nvme-fc: check sgl supported by target (bsc#1179827).\n- nvme-fc: clear q_live at beginning of association teardown (bsc#1186479).\n- nvme-fc: return NVME_SC_HOST_ABORTED_CMD when a command has been aborted (bsc#1184259).\n- nvme-fc: set NVME_REQ_CANCELLED in nvme_fc_terminate_exchange() (bsc#1184259).\n- nvme-fc: short-circuit reconnect retries (bsc#1179827).\n- nvme-multipath: fix double initialization of ANA state (bsc#1178612, bsc#1184259).\n- nvme-multipath: reset bdev to ns head when failover (bsc#178378 bsc#1182999).\n- nvme-pci: Remove tag from process cq (git-fixes).\n- nvme-pci: Remove two-pass completions (git-fixes).\n- nvme-pci: Simplify nvme_poll_irqdisable (git-fixes).\n- nvme-pci: align io queue count with allocted nvme_queue in (git-fixes).\n- nvme-pci: avoid race between nvme_reap_pending_cqes() and nvme_poll() (git-fixes).\n- nvme-pci: dma read memory barrier for completions (git-fixes).\n- nvme-pci: fix \u0027slimmer CQ head update\u0027 (git-fixes).\n- nvme-pci: make sure write/poll_queues less or equal then cpu (git-fixes).\n- nvme-pci: remove last_sq_tail (git-fixes).\n- nvme-pci: remove volatile cqes (git-fixes).\n- nvme-pci: slimmer CQ head update (git-fixes).\n- nvme-pci: use simple suspend when a HMB is enabled (git-fixes).\n- nvme-tcp: Fix possible race of io_work and direct send (git-fixes).\n- nvme-tcp: Fix warning with CONFIG_DEBUG_PREEMPT (git-fixes).\n- nvme-tcp: add clean action for failed reconnection (bsc#1183976).\n- nvme-tcp: fix kconfig dependency warning when !CRYPTO (git-fixes).\n- nvme-tcp: fix misuse of __smp_processor_id with preemption (git-fixes).\n- nvme-tcp: fix possible hang waiting for icresp response (bsc#1179519).\n- nvme-tcp: use cancel tagset helper for tear down (bsc#1183976).\n- nvme: Fix NULL dereference for pci nvme controllers (bsc#1182378).\n- nvme: add \u0027kato\u0027 sysfs attribute (bsc#1179825).\n- nvme: add NVME_REQ_CANCELLED flag in nvme_cancel_request() (bsc#1184259).\n- nvme: define constants for identification values (git-fixes).\n- nvme: do not intialize hwmon for discovery controllers (bsc#1184259).\n- nvme: do not intialize hwmon for discovery controllers (git-fixes).\n- nvme: document nvme controller states (git-fixes).\n- nvme: explicitly update mpath disk capacity on revalidation (git-fixes).\n- nvme: expose reconnect_delay and ctrl_loss_tmo via sysfs (bsc#1182378).\n- nvme: fix controller instance leak (git-fixes).\n- nvme: fix deadlock in disconnect during scan_work and/or ana_work (git-fixes).\n- nvme: fix possible deadlock when I/O is blocked (git-fixes).\n- nvme: remove superfluous else in nvme_ctrl_loss_tmo_store (bsc#1182378).\n- nvme: retrigger ANA log update if group descriptor isn\u0027t found (git-fixes)\n- nvme: sanitize KATO setting (bsc#1179825).\n- nvme: simplify error logic in nvme_validate_ns() (bsc#1184259).\n- nvmet: fix a memory leak (git-fixes).\n- nvmet: seset ns-\u003efile when open fails (bsc#1183873).\n- nvmet: use new ana_log_size instead the old one (bsc#1184259).\n- nxp-i2c: restore includes for kABI (bsc#1185589).\n- nxp-nci: add NXP1002 id (bsc#1185589).\n- phy: phy-twl4030-usb: Fix possible use-after-free in twl4030_usb_remove() (git-fixes).\n- pinctrl: ingenic: Improve unreachable code generation (git-fixes).\n- pinctrl: samsung: use \u0027int\u0027 for register masks in Exynos (git-fixes).\n- platform/mellanox: mlxbf-tmfifo: Fix a memory barrier issue (git-fixes).\n- platform/x86: intel_pmc_core: Do not use global pmcdev in quirks (git-fixes).\n- platform/x86: thinkpad_acpi: Correct thermal sensor allocation (git-fixes).\n- posix-timers: Preserve return value in clock_adjtime32() (git-fixes)\n- power: supply: Use IRQF_ONESHOT (git-fixes).\n- power: supply: generic-adc-battery: fix possible use-after-free in gab_remove() (git-fixes).\n- power: supply: s3c_adc_battery: fix possible use-after-free in s3c_adc_bat_remove() (git-fixes).\n- powerpc/64s: Fix crashes when toggling entry flush barrier (bsc#1177666 git-fixes).\n- powerpc/64s: Fix crashes when toggling stf barrier (bsc#1087082 git-fixes).\n- qtnfmac: Fix possible buffer overflow in qtnf_event_handle_external_auth (git-fixes).\n- rtc: pcf2127: handle timestamp interrupts (bsc#1185495).\n- s390/dasd: fix hanging DASD driver unbind (bsc#1183932 LTC#192153).\n- s390/entry: save the caller of psw_idle (bsc#1185677).\n- s390/kdump: fix out-of-memory with PCI (bsc#1182257 LTC#191375).\n- sched/eas: Do not update misfit status if the task is pinned (git-fixes)\n- sched/fair: Avoid stale CPU util_est value for schedutil in (git-fixes)\n- sched/fair: Fix unfairness caused by missing load decay (git-fixes)\n- scripts/git_sort/git_sort.py: add bpf git repo\n- scsi: core: Run queue in case of I/O resource contention failure (bsc#1186416).\n- scsi: fnic: Kill \u0027exclude_id\u0027 argument to fnic_cleanup_io() (bsc#1179851).\n- scsi: libfc: Avoid invoking response handler twice if ep is already completed (bsc#1186573).\n- scsi: lpfc: Add a option to enable interlocked ABTS before job completion (bsc#1186451).\n- scsi: lpfc: Add ndlp kref accounting for resume RPI path (bsc#1186451).\n- scsi: lpfc: Fix \u0027Unexpected timeout\u0027 error in direct attach topology (bsc#1186451).\n- scsi: lpfc: Fix Node recovery when driver is handling simultaneous PLOGIs (bsc#1186451).\n- scsi: lpfc: Fix bad memory access during VPD DUMP mailbox command (bsc#1186451).\n- scsi: lpfc: Fix crash when lpfc_sli4_hba_setup() fails to initialize the SGLs (bsc#1186451).\n- scsi: lpfc: Fix node handling for Fabric Controller and Domain Controller (bsc#1186451).\n- scsi: lpfc: Fix non-optimized ERSP handling (bsc#1186451).\n- scsi: lpfc: Fix unreleased RPIs when NPIV ports are created (bsc#1186451).\n- scsi: lpfc: Ignore GID-FT response that may be received after a link flip (bsc#1186451).\n- scsi: lpfc: Reregister FPIN types if ELS_RDF is received from fabric controller (bsc#1186451).\n- scsi: lpfc: Update lpfc version to 12.8.0.10 (bsc#1186451).\n- sctp: delay auto_asconf init until binding the first addr\n- seqlock,lockdep: Fix seqcount_latch_init() (bsc#1176564 bsc#1162702).\n- serial: core: fix suspicious security_locked_down() call (git-fixes).\n- serial: core: return early on unsupported ioctls (git-fixes).\n- serial: sh-sci: Fix off-by-one error in FIFO threshold register setting (git-fixes).\n- serial: stm32: fix incorrect characters on console (git-fixes).\n- serial: stm32: fix tx_empty condition (git-fixes).\n- serial: tegra: Fix a mask operation that is always true (git-fixes).\n- smc: disallow TCP_ULP in smc_setsockopt() (git-fixes).\n- spi: ath79: always call chipselect function (git-fixes).\n- spi: ath79: remove spi-master setup and cleanup assignment (git-fixes).\n- spi: dln2: Fix reference leak to master (git-fixes).\n- spi: omap-100k: Fix reference leak to master (git-fixes).\n- spi: qup: fix PM reference leak in spi_qup_remove() (git-fixes).\n- spi: spi-fsl-dspi: Fix a resource leak in an error handling path (git-fixes).\n- staging: emxx_udc: fix loop in _nbu2ss_nuke() (git-fixes).\n- staging: iio: cdc: ad7746: avoid overwrite of num_channels (git-fixes).\n- tcp: fix to update snd_wl1 in bulk receiver fast path\n- thermal/drivers/ti-soc-thermal/bandgap Remove unused variable \u0027val\u0027 (git-fixes).\n- thunderbolt: dma_port: Fix NVM read buffer bounds and offset issue (git-fixes).\n- tracing: Map all PIDs to command lines (git-fixes).\n- tty: amiserial: fix TIOCSSERIAL permission check (git-fixes).\n- tty: fix memory leak in vc_deallocate (git-fixes).\n- tty: moxa: fix TIOCSSERIAL jiffies conversions (git-fixes).\n- tty: moxa: fix TIOCSSERIAL permission check (git-fixes).\n- uio: uio_hv_generic: use devm_kzalloc() for private data alloc (git-fixes).\n- uio_hv_generic: Fix a memory leak in error handling paths (git-fixes).\n- uio_hv_generic: Fix another memory leak in error handling paths (git-fixes).\n- uio_hv_generic: add missed sysfs_remove_bin_file (git-fixes).\n- usb: core: hub: Fix PM reference leak in usb_port_resume() (git-fixes).\n- usb: core: hub: fix race condition about TRSMRCY of resume (git-fixes).\n- usb: dwc2: Fix gadget DMA unmap direction (git-fixes).\n- usb: dwc3: gadget: Enable suspend events (git-fixes).\n- usb: dwc3: gadget: Return success always for kick transfer in ep queue (git-fixes).\n- usb: dwc3: omap: improve extcon initialization (git-fixes).\n- usb: dwc3: pci: Enable usb2-gadget-lpm-disable for Intel Merrifield (git-fixes).\n- usb: fotg210-hcd: Fix an error message (git-fixes).\n- usb: gadget/function/f_fs string table fix for multiple languages (git-fixes).\n- usb: gadget: dummy_hcd: fix gpf in gadget_setup (git-fixes).\n- usb: gadget: f_uac1: validate input parameters (git-fixes).\n- usb: gadget: f_uac2: validate input parameters (git-fixes).\n- usb: gadget: udc: renesas_usb3: Fix a race in usb3_start_pipen() (git-fixes).\n- usb: gadget: uvc: add bInterval checking for HS mode (git-fixes).\n- usb: musb: fix PM reference leak in musb_irq_work() (git-fixes).\n- usb: sl811-hcd: improve misleading indentation (git-fixes).\n- usb: webcam: Invalid size of Processing Unit Descriptor (git-fixes).\n- usb: xhci: Fix port minor revision (git-fixes).\n- usb: xhci: Increase timeout for HC halt (git-fixes).\n- vgacon: Record video mode changes with VT_RESIZEX (git-fixes).\n- video: hyperv_fb: Add ratelimit on error message (bsc#1185725).\n- vrf: fix a comment about loopback device (git-fixes).\n- watchdog/softlockup: Remove obsolete check of last reported task (bsc#1185982).\n- watchdog/softlockup: report the overall time of softlockups (bsc#1185982).\n- watchdog: explicitly update timestamp when reporting softlockup (bsc#1185982).\n- watchdog: rename __touch_watchdog() to a better descriptive name (bsc#1185982).\n- whitespace cleanup\n- wl3501_cs: Fix out-of-bounds warnings in wl3501_mgmt_join (git-fixes).\n- wl3501_cs: Fix out-of-bounds warnings in wl3501_send_pkt (git-fixes).\n- workqueue: Minor follow-ups to the rescuer destruction change (bsc#1185911).\n- workqueue: more destroy_workqueue() fixes (bsc#1185911).\n- x86/cpu: Initialize MSR_TSC_AUX if RDTSCP *or* RDPID is supported (bsc#1152489).\n- xhci: Do not use GFP_KERNEL in (potentially) atomic context (git-fixes).\n- xhci: check control context is valid before dereferencing it (git-fixes).\n- xhci: fix potential array out of bounds with several interrupters (git-fixes).\n- xsk: Respect device\u0027s headroom and tailroom on generic xmit path (git-fixes).\n\nThis update was imported from the SUSE:SLE-15-SP2:Update update project.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2021-947",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_0947-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2021:0947-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3WU4VH2HXVC3VLST5RWUW7LUFNSUEIN/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2021:0947-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3WU4VH2HXVC3VLST5RWUW7LUFNSUEIN/"
},
{
"category": "self",
"summary": "SUSE Bug 1087082",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "self",
"summary": "SUSE Bug 1133021",
"url": "https://bugzilla.suse.com/1133021"
},
{
"category": "self",
"summary": "SUSE Bug 1152457",
"url": "https://bugzilla.suse.com/1152457"
},
{
"category": "self",
"summary": "SUSE Bug 1152489",
"url": "https://bugzilla.suse.com/1152489"
},
{
"category": "self",
"summary": "SUSE Bug 1155518",
"url": "https://bugzilla.suse.com/1155518"
},
{
"category": "self",
"summary": "SUSE Bug 1156395",
"url": "https://bugzilla.suse.com/1156395"
},
{
"category": "self",
"summary": "SUSE Bug 1162702",
"url": "https://bugzilla.suse.com/1162702"
},
{
"category": "self",
"summary": "SUSE Bug 1164648",
"url": "https://bugzilla.suse.com/1164648"
},
{
"category": "self",
"summary": "SUSE Bug 1176564",
"url": "https://bugzilla.suse.com/1176564"
},
{
"category": "self",
"summary": "SUSE Bug 1177666",
"url": "https://bugzilla.suse.com/1177666"
},
{
"category": "self",
"summary": "SUSE Bug 1178418",
"url": "https://bugzilla.suse.com/1178418"
},
{
"category": "self",
"summary": "SUSE Bug 1178612",
"url": "https://bugzilla.suse.com/1178612"
},
{
"category": "self",
"summary": "SUSE Bug 1179827",
"url": "https://bugzilla.suse.com/1179827"
},
{
"category": "self",
"summary": "SUSE Bug 1179851",
"url": "https://bugzilla.suse.com/1179851"
},
{
"category": "self",
"summary": "SUSE Bug 1182378",
"url": "https://bugzilla.suse.com/1182378"
},
{
"category": "self",
"summary": "SUSE Bug 1182999",
"url": "https://bugzilla.suse.com/1182999"
},
{
"category": "self",
"summary": "SUSE Bug 1183346",
"url": "https://bugzilla.suse.com/1183346"
},
{
"category": "self",
"summary": "SUSE Bug 1183868",
"url": "https://bugzilla.suse.com/1183868"
},
{
"category": "self",
"summary": "SUSE Bug 1183873",
"url": "https://bugzilla.suse.com/1183873"
},
{
"category": "self",
"summary": "SUSE Bug 1183932",
"url": "https://bugzilla.suse.com/1183932"
},
{
"category": "self",
"summary": "SUSE Bug 1183947",
"url": "https://bugzilla.suse.com/1183947"
},
{
"category": "self",
"summary": "SUSE Bug 1184081",
"url": "https://bugzilla.suse.com/1184081"
},
{
"category": "self",
"summary": "SUSE Bug 1184082",
"url": "https://bugzilla.suse.com/1184082"
},
{
"category": "self",
"summary": "SUSE Bug 1184611",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "self",
"summary": "SUSE Bug 1184855",
"url": "https://bugzilla.suse.com/1184855"
},
{
"category": "self",
"summary": "SUSE Bug 1185428",
"url": "https://bugzilla.suse.com/1185428"
},
{
"category": "self",
"summary": "SUSE Bug 1185497",
"url": "https://bugzilla.suse.com/1185497"
},
{
"category": "self",
"summary": "SUSE Bug 1185589",
"url": "https://bugzilla.suse.com/1185589"
},
{
"category": "self",
"summary": "SUSE Bug 1185606",
"url": "https://bugzilla.suse.com/1185606"
},
{
"category": "self",
"summary": "SUSE Bug 1185645",
"url": "https://bugzilla.suse.com/1185645"
},
{
"category": "self",
"summary": "SUSE Bug 1185677",
"url": "https://bugzilla.suse.com/1185677"
},
{
"category": "self",
"summary": "SUSE Bug 1185680",
"url": "https://bugzilla.suse.com/1185680"
},
{
"category": "self",
"summary": "SUSE Bug 1185696",
"url": "https://bugzilla.suse.com/1185696"
},
{
"category": "self",
"summary": "SUSE Bug 1185703",
"url": "https://bugzilla.suse.com/1185703"
},
{
"category": "self",
"summary": "SUSE Bug 1185725",
"url": "https://bugzilla.suse.com/1185725"
},
{
"category": "self",
"summary": "SUSE Bug 1185758",
"url": "https://bugzilla.suse.com/1185758"
},
{
"category": "self",
"summary": "SUSE Bug 1185859",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "self",
"summary": "SUSE Bug 1185861",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "self",
"summary": "SUSE Bug 1185863",
"url": "https://bugzilla.suse.com/1185863"
},
{
"category": "self",
"summary": "SUSE Bug 1185898",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "self",
"summary": "SUSE Bug 1185899",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "self",
"summary": "SUSE Bug 1185911",
"url": "https://bugzilla.suse.com/1185911"
},
{
"category": "self",
"summary": "SUSE Bug 1185938",
"url": "https://bugzilla.suse.com/1185938"
},
{
"category": "self",
"summary": "SUSE Bug 1185987",
"url": "https://bugzilla.suse.com/1185987"
},
{
"category": "self",
"summary": "SUSE Bug 1185988",
"url": "https://bugzilla.suse.com/1185988"
},
{
"category": "self",
"summary": "SUSE Bug 1186061",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "self",
"summary": "SUSE Bug 1186285",
"url": "https://bugzilla.suse.com/1186285"
},
{
"category": "self",
"summary": "SUSE Bug 1186320",
"url": "https://bugzilla.suse.com/1186320"
},
{
"category": "self",
"summary": "SUSE Bug 1186439",
"url": "https://bugzilla.suse.com/1186439"
},
{
"category": "self",
"summary": "SUSE Bug 1186441",
"url": "https://bugzilla.suse.com/1186441"
},
{
"category": "self",
"summary": "SUSE Bug 1186460",
"url": "https://bugzilla.suse.com/1186460"
},
{
"category": "self",
"summary": "SUSE Bug 1186498",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "self",
"summary": "SUSE Bug 1186501",
"url": "https://bugzilla.suse.com/1186501"
},
{
"category": "self",
"summary": "SUSE Bug 1186573",
"url": "https://bugzilla.suse.com/1186573"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24586 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24587 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24587/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24588 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26139 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26141 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26145 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26145/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26147 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23134 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32399 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33034 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33034/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33200 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3491 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3491/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-07-01T04:53:53Z",
"generator": {
"date": "2021-07-01T04:53:53Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2021:0947-1",
"initial_release_date": "2021-07-01T04:53:53Z",
"revision_history": [
{
"date": "2021-07-01T04:53:53Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"product": {
"name": "kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"product_id": "kernel-devel-rt-5.3.18-lp152.3.14.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"product": {
"name": "kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"product_id": "kernel-source-rt-5.3.18-lp152.3.14.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"product_id": "cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"product_id": "cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"product": {
"name": "dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"product_id": "dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"product": {
"name": "dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"product_id": "dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"product": {
"name": "gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"product_id": "gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"product": {
"name": "gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"product_id": "gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"product": {
"name": "kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"product_id": "kernel-rt-5.3.18-lp152.3.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"product": {
"name": "kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"product_id": "kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"product": {
"name": "kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"product_id": "kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"product": {
"name": "kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"product_id": "kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"product": {
"name": "kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"product_id": "kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"product": {
"name": "kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"product_id": "kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"product": {
"name": "kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"product_id": "kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"product": {
"name": "kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"product_id": "kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"product": {
"name": "kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"product_id": "kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"product_id": "ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"product_id": "ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"product": {
"name": "reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"product_id": "reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"product": {
"name": "reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"product_id": "reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.2",
"product": {
"name": "openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64"
},
"product_reference": "cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
},
"product_reference": "cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64"
},
"product_reference": "dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
},
"product_reference": "dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64"
},
"product_reference": "gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
},
"product_reference": "gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-rt-5.3.18-lp152.3.14.1.noarch as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch"
},
"product_reference": "kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-5.3.18-lp152.3.14.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64"
},
"product_reference": "kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64"
},
"product_reference": "kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64"
},
"product_reference": "kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64"
},
"product_reference": "kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64"
},
"product_reference": "kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64"
},
"product_reference": "kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-5.3.18-lp152.3.14.1.noarch as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch"
},
"product_reference": "kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64"
},
"product_reference": "kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64"
},
"product_reference": "kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
},
"product_reference": "kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64"
},
"product_reference": "ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
},
"product_reference": "ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64"
},
"product_reference": "reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
},
"product_reference": "reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-24586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24586"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24586",
"url": "https://www.suse.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-01T04:53:53Z",
"details": "moderate"
}
],
"title": "CVE-2020-24586"
},
{
"cve": "CVE-2020-24587",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24587"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24587",
"url": "https://www.suse.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1185862 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-01T04:53:53Z",
"details": "moderate"
}
],
"title": "CVE-2020-24587"
},
{
"cve": "CVE-2020-24588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24588"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24588",
"url": "https://www.suse.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "SUSE Bug 1185861 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1192868"
},
{
"category": "external",
"summary": "SUSE Bug 1199701 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1199701"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-01T04:53:53Z",
"details": "moderate"
}
],
"title": "CVE-2020-24588"
},
{
"cve": "CVE-2020-26139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26139"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26139",
"url": "https://www.suse.com/security/cve/CVE-2020-26139"
},
{
"category": "external",
"summary": "SUSE Bug 1186062 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-01T04:53:53Z",
"details": "moderate"
}
],
"title": "CVE-2020-26139"
},
{
"cve": "CVE-2020-26141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26141"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26141",
"url": "https://www.suse.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "SUSE Bug 1185987 for CVE-2020-26141",
"url": "https://bugzilla.suse.com/1185987"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-01T04:53:53Z",
"details": "moderate"
}
],
"title": "CVE-2020-26141"
},
{
"cve": "CVE-2020-26145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26145"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26145",
"url": "https://www.suse.com/security/cve/CVE-2020-26145"
},
{
"category": "external",
"summary": "SUSE Bug 1185860 for CVE-2020-26145",
"url": "https://bugzilla.suse.com/1185860"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-01T04:53:53Z",
"details": "moderate"
}
],
"title": "CVE-2020-26145"
},
{
"cve": "CVE-2020-26147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26147"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26147",
"url": "https://www.suse.com/security/cve/CVE-2020-26147"
},
{
"category": "external",
"summary": "SUSE Bug 1233723 for CVE-2020-26147",
"url": "https://bugzilla.suse.com/1233723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-01T04:53:53Z",
"details": "moderate"
}
],
"title": "CVE-2020-26147"
},
{
"cve": "CVE-2021-23134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23134"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23134",
"url": "https://www.suse.com/security/cve/CVE-2021-23134"
},
{
"category": "external",
"summary": "SUSE Bug 1186060 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "external",
"summary": "SUSE Bug 1186061 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "external",
"summary": "SUSE Bug 1220739 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1220739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-01T04:53:53Z",
"details": "important"
}
],
"title": "CVE-2021-23134"
},
{
"cve": "CVE-2021-32399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32399"
}
],
"notes": [
{
"category": "general",
"text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32399",
"url": "https://www.suse.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "SUSE Bug 1184611 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "external",
"summary": "SUSE Bug 1185898 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "external",
"summary": "SUSE Bug 1185899 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-01T04:53:53Z",
"details": "important"
}
],
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-33034",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33034"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33034",
"url": "https://www.suse.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "SUSE Bug 1186111 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "external",
"summary": "SUSE Bug 1186285 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-01T04:53:53Z",
"details": "important"
}
],
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-33200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33200"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-\u003ealu_limit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33200",
"url": "https://www.suse.com/security/cve/CVE-2021-33200"
},
{
"category": "external",
"summary": "SUSE Bug 1186484 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "external",
"summary": "SUSE Bug 1186498 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-01T04:53:53Z",
"details": "important"
}
],
"title": "CVE-2021-33200"
},
{
"cve": "CVE-2021-3491",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3491"
}
],
"notes": [
{
"category": "general",
"text": "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3491",
"url": "https://www.suse.com/security/cve/CVE-2021-3491"
},
{
"category": "external",
"summary": "SUSE Bug 1185642 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "external",
"summary": "SUSE Bug 1187090 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1187090"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-01T04:53:53Z",
"details": "important"
}
],
"title": "CVE-2021-3491"
}
]
}
cisco-sa-wifi-faf-22epcewu
Vulnerability from csaf_cisco
Notes
{
"document": {
"acknowledgments": [
{
"summary": "These vulnerabilities were reported to Cisco by Dr. Mathy Vanhoef of New York University Abu Dhabi. Cisco would like to thank Dr. Vanhoef for his continued help and support during the handling of these vulnerabilities."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"notes": [
{
"category": "summary",
"text": "On May 11, 2021, the research paper Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation was made public. This paper discusses 12 vulnerabilities in the 802.11 standard. One vulnerability is in the frame aggregation functionality, two vulnerabilities are in the frame fragmentation functionality, and the other nine are implementation vulnerabilities. These vulnerabilities could allow an attacker to forge encrypted frames, which could in turn enable the exfiltration of sensitive data from a targeted device.\r\n\r\nThis advisory will be updated as additional information becomes available.\r\n\r\n",
"title": "Summary"
},
{
"category": "general",
"text": "Cisco is investigating its product line to determine which products may be affected by these vulnerabilities. As the investigation progresses, Cisco will update this advisory with information about affected products.",
"title": "Affected Products"
},
{
"category": "general",
"text": "The following table lists Cisco products that are affected by the vulnerabilities that are described in this advisory. If a future release date is indicated for software, the date provided represents an estimate based on all information known to Cisco as of the Last Updated date at the top of the advisory. Availability dates are subject to change based on a number of factors, including satisfactory testing results and delivery of other priority features and fixes. If no version or date is listed for an affected component (indicated by a blank field and/or an advisory designation of Interim), Cisco is continuing to evaluate the fix and will update the advisory as additional information becomes available. After the advisory is marked Final, customers should refer to the associated Cisco bug(s) for further details.\r\n CVE ID Cisco Bug ID Fixed Release Availability [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"] Aironet 1532 APs, AP803 Integrated AP on IR829 Industrial Integrated Services Routers CVE-2020-24586 CSCvy32690 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy32690\"] 8.5MR8\r\n8.10MR6 CVE-2020-24587 CSCvy32690 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy32690\"] 8.5MR8\r\n8.10MR6 CVE-2020-24588 CSCvy32690 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy32690\"] 8.5MR8\r\n8.10MR6 CVE-2020-26139 Not affected N/A CVE-2020-26140 Not affected N/A CVE-2020-26141 Not affected N/A CVE-2020-26142 Not affected N/A CVE-2020-26143 Not affected N/A CVE-2020-26144 Not affected N/A CVE-2020-26145 Not affected N/A CVE-2020-26146 Not affected N/A CVE-2020-26147 Not affected N/A Aironet 1542 APs, Aironet 1810 APs, Aironet 1815 APs, Aironet 1832 APs, Aironet 1842 APs, Aironet 1852 APs, Aironet 1800i APs CVE-2020-24586 Not affected N/A CVE-2020-24587 CSCvx24420 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24420\"] 8.5MR8\r\n8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-24588 CSCvx24420 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24420\"] 8.5MR8\r\n8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26139 CSCvx24420 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24420\"] 8.5MR8\r\n8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26140 Not affected N/A CVE-2020-26141 Not affected N/A CVE-2020-26142 Not affected N/A CVE-2020-26143 Not affected N/A CVE-2020-26144 Not affected N/A CVE-2020-26145 CSCvx24420 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24420\"] 8.5MR8\r\n8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26146 CSCvx24420 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24420\"] 8.5MR8\r\n8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26147 Not affected N/A Aironet 1552 APs, Aironet 1552H APs, Aironet 1572 APs, Aironet 1702 APs, Aironet 2702 APs, Aironet 3702 APs, IW 3702 APs CVE-2020-24586 CSCvy32680 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy32680\"] 8.5MR8\r\n8.10MR6\r\n16.12.6\r\n17.3.4 CVE-2020-24587 CSCvy32680 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy32680\"] 8.5MR8\r\n8.10MR6\r\n16.12.6\r\n17.3.4 CVE-2020-24588 Not affected N/A CVE-2020-26139 Not affected N/A CVE-2020-26140 Not affected N/A CVE-2020-26141 Not affected N/A CVE-2020-26142 Not affected N/A CVE-2020-26143 Not affected N/A CVE-2020-26144 Not affected N/A CVE-2020-26145 Not affected N/A CVE-2020-26146 Not affected N/A CVE-2020-26147 Not affected N/A Aironet 1560 Series APs, Aironet 2800 Series APs, Aironet Series 3800 APs, Aironet Series 4800 APs, Catalyst IW 6300 APs, 6300 Series Embedded Services APs (ESW6300) CVE-2020-24586 CSCvx24449 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24449\"] 8.5MR8\r\n8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-24587 CSCvx24449 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24449\"] 8.5MR8\r\n8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-24588 Not affected N/A CVE-2020-26139 Not affected N/A CVE-2020-26140 CSCvy36698 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy36698\"] 8.5MR8\r\n8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26141 Not affected N/A CVE-2020-26142 Not affected N/A CVE-2020-26143 CSCvy36698 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy36698\"] 8.5MR8\r\n8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26144 Not affected N/A CVE-2020-26145 Not affected N/A CVE-2020-26146 CSCvy36698 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy36698\"] 8.5MR8\r\n8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26147 CSCvy36698 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy36698\"] 8.5MR8\r\n8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 Catalyst 9105 APs, Catalyst 9115 APs, Catalyst 9120 APs, Integrated AP on 1100 Integrated Services Routers CVE-2020-24586 CSCvx24425 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24425\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-24587 CSCvx24425 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24425\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-24588 CSCvx24425 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24425\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26139 Not affected N/A CVE-2020-26140 Not affected N/A CVE-2020-26141 Not affected N/A CVE-2020-26142 Not affected N/A CVE-2020-26143 Not affected N/A CVE-2020-26144 Not affected N/A CVE-2020-26145 Not affected N/A CVE-2020-26146 Not affected N/A CVE-2020-26147 Not affected N/A Catalyst 9117 APs CVE-2020-24586 CSCvx24439 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24439\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-24587 CSCvx24439 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24439\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-24588 CSCvx24439 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24439\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26139 CSCvx24439 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24439\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26140 Not affected N/A CVE-2020-26141 Not affected N/A CVE-2020-26142 Not affected N/A CVE-2020-26143 Not affected N/A CVE-2020-26144 CSCvx24439 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24439\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26145 CSCvx24439 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24439\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26146 CSCvx24439 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24439\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26147 Not affected N/A Catalyst 9124 APs1, Catalyst 9130 APs CVE-2020-24586 CSCvx24428 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24428\"]\r\nCSCvx24452 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24452\"]\r\nCSCvx24456 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24456\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-24587 CSCvx24428 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24428\"]\r\nCSCvx24452 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24452\"]\r\nCSCvx24456 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24456\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-24588 CSCvx24428 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24428\"]\r\nCSCvx24452 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24452\"]\r\nCSCvx24456 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24456\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26139 CSCvx24428 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24428\"]\r\nCSCvx24452 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24452\"]\r\nCSCvx24456 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24456\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26140 Not affected N/A CVE-2020-26141 Not affected N/A CVE-2020-26142 Not affected N/A CVE-2020-26143 Not affected N/A CVE-2020-26144 CSCvx24428 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24428\"]\r\nCSCvx24452 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24452\"]\r\nCSCvx24456 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24456\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26145 CSCvx24428 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24428\"]\r\nCSCvx24452 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24452\"]\r\nCSCvx24456 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24456\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26146 CSCvx24428 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24428\"]\r\nCSCvx24452 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24452\"]\r\nCSCvx24456 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24456\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26147 Not affected N/A 1. Catalyst 9124 APs were not supported until Release 17.5, and the fix will be available in Release 17.6.1 Meraki GR10, GR60, MR20, MR30H, MR33, MR36, MR42, MR42E, MR44, MR45, MR46, MR46E, MR52, MR53, MR53E, MR55, MR56, MR70, MR74, MR76, MR84, MR86 CVE-2020-24586 No bug ID MR 27.7.1 CVE-2020-24587 No bug ID MR 27.7.1 CVE-2020-24588 No bug ID MR 27.7.1 CVE-2020-26139 No bug ID MR 27.7.1 CVE-2020-26140 No bug ID MR 27.7.1 CVE-2020-26141 No bug ID MR 27.7.1 CVE-2020-26142 No bug ID MR 27.7.1 CVE-2020-26143 No bug ID MR 27.7.1 CVE-2020-26144 No bug ID MR 27.7.1 CVE-2020-26145 No bug ID MR 27.7.1 CVE-2020-26146 No bug ID MR 27.7.1 CVE-2020-26147 No bug ID MR 27.7.1 Meraki MR12, MR18, MR26, MR32, MR34, MR62, MR66, MR72 CVE-2020-24586 No bug ID MR 26.8.3 CVE-2020-24587 No bug ID MR 26.8.3 CVE-2020-24588 No bug ID MR 26.8.3 CVE-2020-26139 No bug ID MR 26.8.3 CVE-2020-26140 No bug ID MR 26.8.3 CVE-2020-26141 No bug ID MR 26.8.3 CVE-2020-26142 No bug ID MR 26.8.3 CVE-2020-26143 No bug ID MR 26.8.3 CVE-2020-26144 No bug ID MR 26.8.3 CVE-2020-26145 No bug ID MR 26.8.3 CVE-2020-26146 No bug ID MR 26.8.3 CVE-2020-26147 No bug ID MR 26.8.3 Meraki MX64W, MX65W, MX67W, MX67CW, MX68W, MX68CW, Z3, Z3C1 CVE-2020-24586 No bug ID MX 17.0 CVE-2020-24587 No bug ID MX 17.0 CVE-2020-24588 No bug ID MX 17.0 CVE-2020-26139 No bug ID MX 17.0 CVE-2020-26140 No bug ID MX 17.0 CVE-2020-26141 No bug ID MX 17.0 CVE-2020-26142 No bug ID MX 17.0 CVE-2020-26143 No bug ID MX 17.0 CVE-2020-26144 No bug ID MX 17.0 CVE-2020-26145 No bug ID MX 17.0 CVE-2020-26146 No bug ID MX 17.0 CVE-2020-26147 No bug ID MX 17.0 1. Cisco will not fix these vulnerabilities in the following Cisco Meraki products: MX60W and Z1 IP Phone 8861, IP Phone 8865, and IP Conference Phone 8832 CVE-2020-24586 CSCvx60997 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997\"] 14.1(1) CVE-2020-24587 CSCvx60997 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997\"] 14.1(1) CVE-2020-24588 CSCvx60997 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997\"] 14.1(1) CVE-2020-26139 CSCvx60997 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997\"] 14.1(1) CVE-2020-26140 CSCvx60997 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997\"] 14.1(1) CVE-2020-26141 CSCvx60997 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997\"] 14.1(1) CVE-2020-26142 CSCvx60997 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997\"] 14.1(1) CVE-2020-26143 CSCvx60997 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997\"] 14.1(1) CVE-2020-26144 CSCvx60997 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997\"] 14.1(1) CVE-2020-26145 CSCvx60997 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997\"] 14.1(1) CVE-2020-26146 CSCvx60997 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997\"] 14.1(1) CVE-2020-26147 CSCvx60997 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997\"] 14.1(1) IP Phone 6861 and IP Phone 8861 Running Third-Party Call Control (3PCC) Software CVE-2020-24586 CSCvx61001 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001\"] 11.3(5) CVE-2020-24587 CSCvx61001 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001\"] 11.3(5) CVE-2020-24588 CSCvx61001 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001\"] 11.3(5) CVE-2020-26139 CSCvx61001 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001\"] 11.3(5) CVE-2020-26140 CSCvx61001 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001\"] 11.3(5) CVE-2020-26141 CSCvx61001 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001\"] 11.3(5) CVE-2020-26142 CSCvx61001 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001\"] 11.3(5) CVE-2020-26143 CSCvx61001 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001\"] 11.3(5) CVE-2020-26144 CSCvx61001 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001\"] 11.3(5) CVE-2020-26145 CSCvx61001 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001\"] 11.3(5) CVE-2020-26146 CSCvx61001 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001\"] 11.3(5) CVE-2020-26147 CSCvx61001 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001\"] 11.3(5) Wireless IP Phone 8821 CVE-2020-24586 CSCvx61012 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012\"] 11.0(6)SR2 CVE-2020-24587 CSCvx61012 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012\"] 11.0(6)SR2 CVE-2020-24588 CSCvx61012 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012\"] 11.0(6)SR2 CVE-2020-26139 CSCvx61012 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012\"] 11.0(6)SR2 CVE-2020-26140 CSCvx61012 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012\"] 11.0(6)SR2 CVE-2020-26141 CSCvx61012 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012\"] 11.0(6)SR2 CVE-2020-26142 CSCvx61012 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012\"] 11.0(6)SR2 CVE-2020-26143 CSCvx61012 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012\"] 11.0(6)SR2 CVE-2020-26144 CSCvx61012 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012\"] 11.0(6)SR2 CVE-2020-26145 CSCvx61012 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012\"] 11.0(6)SR2 CVE-2020-26146 CSCvx61012 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012\"] 11.0(6)SR2 CVE-2020-26147 CSCvx61012 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012\"] 11.0(6)SR2 Webex Desk Series and Webex Room Series CVE-2020-24586 CSCvx89821 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821\"] 1.2(0)SR1 CVE-2020-24587 CSCvx89821 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821\"] 1.2(0)SR1 CVE-2020-24588 CSCvx89821 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821\"] 1.2(0)SR1 CVE-2020-26139 CSCvx89821 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821\"] 1.2(0)SR1 CVE-2020-26140 CSCvx89821 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821\"] 1.2(0)SR1 CVE-2020-26141 CSCvx89821 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821\"] 1.2(0)SR1 CVE-2020-26142 CSCvx89821 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821\"] 1.2(0)SR1 CVE-2020-26143 CSCvx89821 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821\"] 1.2(0)SR1 CVE-2020-26144 CSCvx89821 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821\"] 1.2(0)SR1 CVE-2020-26145 CSCvx89821 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821\"] 1.2(0)SR1 CVE-2020-26146 CSCvx89821 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821\"] 1.2(0)SR1 CVE-2020-26147 CSCvx89821 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821\"] 1.2(0)SR1 Webex Board Series CVE-2020-24586 CSCvx61020 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020\"] 10.8.2.5 CVE-2020-24587 CSCvx61020 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020\"] 10.8.2.5 CVE-2020-24588 CSCvx61020 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020\"] 10.8.2.5 CVE-2020-26139 CSCvx61020 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020\"] 10.8.2.5 CVE-2020-26140 CSCvx61020 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020\"] 10.8.2.5 CVE-2020-26141 CSCvx61020 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020\"] 10.8.2.5 CVE-2020-26142 CSCvx61020 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020\"] 10.8.2.5 CVE-2020-26143 CSCvx61020 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020\"] 10.8.2.5 CVE-2020-26144 CSCvx61020 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020\"] 10.8.2.5 CVE-2020-26145 CSCvx61020 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020\"] 10.8.2.5 CVE-2020-26146 CSCvx61020 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020\"] 10.8.2.5 CVE-2020-26147 CSCvx61020 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020\"] 10.8.2.5 Webex Wireless Phone 840 and 860 CVE-2020-24586 CSCvx62886 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886\"] 1.4(0) CVE-2020-24587 CSCvx62886 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886\"] 1.4(0) CVE-2020-24588 CSCvx62886 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886\"] 1.4(0) CVE-2020-26139 CSCvx62886 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886\"] 1.4(0) CVE-2020-26140 CSCvx62886 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886\"] 1.4(0) CVE-2020-26141 CSCvx62886 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886\"] 1.4(0) CVE-2020-26142 CSCvx62886 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886\"] 1.4(0) CVE-2020-26143 CSCvx62886 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886\"] 1.4(0) CVE-2020-26144 CSCvx62886 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886\"] 1.4(0) CVE-2020-26145 CSCvx62886 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886\"] 1.4(0) CVE-2020-26146 CSCvx62886 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886\"] 1.4(0) CVE-2020-26147 CSCvx62886 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886\"] 1.4(0)",
"title": "Vulnerable Products"
},
{
"category": "general",
"text": "Only products listed in the Vulnerable Products [\"#vp\"] section of this advisory are known to be affected by this vulnerability.",
"title": "Products Confirmed Not Vulnerable"
},
{
"category": "general",
"text": "The vulnerabilities are not dependent on one another. Exploitation of one of the vulnerabilities is not required to exploit another vulnerability. In addition, a software release that is affected by one of the vulnerabilities may not be affected by the other vulnerabilities.\r\n\r\nFor a description of the following vulnerabilities, see Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation [\"https://papers.mathyvanhoef.com/usenix2021.pdf\"].\r\n\r\nFor additional information, see FragAttacks [\"https://fragattacks.com/\"].\r\n\r\nCVE-2020-26140: Accepting plaintext data frames in a protected network\r\n\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 6.5\r\nCVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N\r\n\r\nCVE-2020-26143: Accepting fragmented plaintext data frames in a protected network\r\n\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 6.5\r\nCVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N\r\n\r\nCVE-2020-26144: Accepting plaintext A-MSDU frames that start with an RFC1042 header with EtherType EAPOL (in an encrypted network)\r\n\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 6.5\r\nCVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N\r\n\r\nCVE-2020-26145: Accepting plaintext broadcast fragments as full frames (in an encrypted network)\r\n\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 6.5\r\nCVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N\r\n\r\nCVE-2020-24586: Not clearing fragments from memory when (re)connecting to a network\r\n\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 5.7\r\nCVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N\r\n\r\nCVE-2020-24588: Accepting non-SPP A-MSDU frames\r\n\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 5.7\r\nCVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N\r\n\r\nCVE-2020-26139: Forwarding EAPOL frames even though the sender is not yet authenticated\r\n\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 5.7\r\nCVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L\r\n\r\nCVE-2020-26141: Not verifying the TKIP MIC of fragmented frames\r\n\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 5.7\r\nCVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N\r\n\r\nCVE-2020-26142: Processing fragmented frames as full frames\r\n\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 5.7\r\nCVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N\r\n\r\nCVE-2020-24587: Reassembling fragments encrypted under different keys\r\n\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 4.8\r\nCVSS Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N\r\n\r\nCVE-2020-26146: Reassembling encrypted fragments with non-consecutive packet numbers\r\n\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 4.8\r\nCVSS Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N\r\n\r\nCVE-2020-26147: Reassembling mixed encrypted/plaintext fragments\r\n\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 4.8\r\nCVSS Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N",
"title": "Details"
},
{
"category": "general",
"text": "There are no workarounds that address these vulnerabilities.",
"title": "Workarounds"
},
{
"category": "general",
"text": "For information about fixed software releases [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], consult the Cisco bugs identified in the Vulnerable Products [\"#vp\"] section of this advisory.\r\n\r\nWhen considering software upgrades [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page [\"https://www.cisco.com/go/psirt\"], to determine exposure and a complete upgrade solution.\r\n\r\nIn all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.",
"title": "Fixed Software"
},
{
"category": "general",
"text": "To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html\"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.",
"title": "Vulnerability Policy"
},
{
"category": "general",
"text": "The Cisco Product Security Incident Response Team (PSIRT) is aware that proof-of-concept exploit code is available for the vulnerabilities that are described in this advisory.\r\n\r\nThe Cisco PSIRT is not aware of any malicious use of the vulnerabilities that are described in this advisory.",
"title": "Exploitation and Public Announcements"
},
{
"category": "general",
"text": "These vulnerabilities were reported to Cisco by Dr. Mathy Vanhoef of New York University Abu Dhabi. Cisco would like to thank Dr. Vanhoef for his continued help and support during the handling of these vulnerabilities.",
"title": "Source"
},
{
"category": "legal_disclaimer",
"text": "THIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.\r\n\r\nA standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.",
"title": "Legal Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "psirt@cisco.com",
"issuing_authority": "Cisco PSIRT",
"name": "Cisco",
"namespace": "https://wwww.cisco.com"
},
"references": [
{
"category": "self",
"summary": "Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu"
},
{
"category": "external",
"summary": "Cisco Security Vulnerability Policy",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html"
},
{
"category": "external",
"summary": "Fixed Release Availability",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes"
},
{
"category": "external",
"summary": "CSCvy32690",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy32690"
},
{
"category": "external",
"summary": "CSCvx24420",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24420"
},
{
"category": "external",
"summary": "CSCvy32680",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy32680"
},
{
"category": "external",
"summary": "CSCvx24449",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24449"
},
{
"category": "external",
"summary": "CSCvy36698",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy36698"
},
{
"category": "external",
"summary": "CSCvx24425",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24425"
},
{
"category": "external",
"summary": "CSCvx24439",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24439"
},
{
"category": "external",
"summary": "CSCvx24428",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24428"
},
{
"category": "external",
"summary": "CSCvx24452",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24452"
},
{
"category": "external",
"summary": "CSCvx24456",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24456"
},
{
"category": "external",
"summary": "CSCvx60997",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997"
},
{
"category": "external",
"summary": "CSCvx61001",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001"
},
{
"category": "external",
"summary": "CSCvx61012",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012"
},
{
"category": "external",
"summary": "CSCvx89821",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821"
},
{
"category": "external",
"summary": "CSCvx61020",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020"
},
{
"category": "external",
"summary": "CSCvx62886",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886"
},
{
"category": "external",
"summary": "Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation",
"url": "https://papers.mathyvanhoef.com/usenix2021.pdf"
},
{
"category": "external",
"summary": "FragAttacks",
"url": "https://fragattacks.com/"
},
{
"category": "external",
"summary": "Cisco\u0026nbsp;Security Advisories page",
"url": "https://www.cisco.com/go/psirt"
}
],
"title": "Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021",
"tracking": {
"current_release_date": "2021-12-15T15:47:26+00:00",
"generator": {
"date": "2024-05-10T23:04:25+00:00",
"engine": {
"name": "TVCE"
}
},
"id": "cisco-sa-wifi-faf-22epcEWu",
"initial_release_date": "2021-05-11T18:00:00+00:00",
"revision_history": [
{
"date": "2021-05-10T16:33:53+00:00",
"number": "1.0.0",
"summary": "Initial public release."
},
{
"date": "2021-05-11T21:59:40+00:00",
"number": "1.1.0",
"summary": "Updated affected Meraki MR products."
},
{
"date": "2021-05-14T20:43:24+00:00",
"number": "1.2.0",
"summary": "Added additional affected products."
},
{
"date": "2021-05-17T17:42:47+00:00",
"number": "1.3.0",
"summary": "Added additional affected products."
},
{
"date": "2021-05-19T20:50:42+00:00",
"number": "1.4.0",
"summary": "Added additional fixed releases."
},
{
"date": "2021-06-02T20:48:21+00:00",
"number": "1.5.0",
"summary": "Update affected products."
},
{
"date": "2021-07-13T18:42:53+00:00",
"number": "1.6.0",
"summary": "Added additional fixed releases for Meraki products."
},
{
"date": "2021-08-30T19:06:07+00:00",
"number": "1.7.0",
"summary": "Updated fixed release details for multiple products."
},
{
"date": "2021-10-05T14:54:59+00:00",
"number": "1.8.0",
"summary": "Updated fixed release details for Aironet 1532/AP803 products."
},
{
"date": "2021-12-15T15:47:26+00:00",
"number": "1.9.0",
"summary": "Updated fixed releases."
}
],
"status": "final",
"version": "1.9.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_family",
"name": "Cisco Aironet Access Point Software",
"product": {
"name": "Cisco Aironet Access Point Software ",
"product_id": "CSAFPID-190024"
}
},
{
"category": "product_family",
"name": "Cisco IP Phones with Multiplatform Firmware",
"product": {
"name": "Cisco IP Phones with Multiplatform Firmware ",
"product_id": "CSAFPID-277607"
}
},
{
"category": "product_family",
"name": "Cisco TelePresence Endpoint Software (TC/CE)",
"product": {
"name": "Cisco TelePresence Endpoint Software (TC/CE) ",
"product_id": "CSAFPID-278404"
}
},
{
"category": "product_family",
"name": "Cisco Webex Room Phone",
"product": {
"name": "Cisco Webex Room Phone ",
"product_id": "CSAFPID-278888"
}
},
{
"category": "product_family",
"name": "Cisco Business Wireless Access Point Software",
"product": {
"name": "Cisco Business Wireless Access Point Software ",
"product_id": "CSAFPID-280012"
}
},
{
"category": "product_family",
"name": "Cisco Aironet Access Point Software (IOS XE Controller)",
"product": {
"name": "Cisco Aironet Access Point Software (IOS XE Controller) ",
"product_id": "CSAFPID-280019"
}
}
],
"category": "vendor",
"name": "Cisco"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-26144",
"ids": [
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62884"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62876"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx89821"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62886"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24452"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24428"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24439"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24456"
}
],
"notes": [
{
"category": "other",
"text": "Complete.",
"title": "Affected Product Comprehensiveness"
}
],
"product_status": {
"known_affected": [
"CSAFPID-277607",
"CSAFPID-278404",
"CSAFPID-278888",
"CSAFPID-280019",
"CSAFPID-190024",
"CSAFPID-280012"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Cisco has released software updates that address this vulnerability.",
"product_ids": [
"CSAFPID-278404",
"CSAFPID-190024",
"CSAFPID-280012",
"CSAFPID-280019",
"CSAFPID-278888",
"CSAFPID-277607"
],
"url": "https://software.cisco.com"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-277607",
"CSAFPID-278404",
"CSAFPID-278888"
]
}
],
"title": "vuln-CVE-2020-26144"
},
{
"cve": "CVE-2020-26141",
"ids": [
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62884"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62876"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx89821"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62886"
}
],
"notes": [
{
"category": "other",
"text": "Complete.",
"title": "Affected Product Comprehensiveness"
}
],
"product_status": {
"known_affected": [
"CSAFPID-277607",
"CSAFPID-278404",
"CSAFPID-278888"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Cisco has released software updates that address this vulnerability.",
"product_ids": [
"CSAFPID-278404",
"CSAFPID-278888",
"CSAFPID-277607"
],
"url": "https://software.cisco.com"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-277607",
"CSAFPID-278404",
"CSAFPID-278888"
]
}
],
"title": "vuln-CVE-2020-26141"
},
{
"cve": "CVE-2020-26146",
"ids": [
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24420"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24425"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24439"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24441"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24440"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24449"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvy32694"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62884"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62876"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62886"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx89821"
}
],
"notes": [
{
"category": "other",
"text": "Complete.",
"title": "Affected Product Comprehensiveness"
}
],
"product_status": {
"known_affected": [
"CSAFPID-190024",
"CSAFPID-277607",
"CSAFPID-280012",
"CSAFPID-278888",
"CSAFPID-278404",
"CSAFPID-280019"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Cisco has released software updates that address this vulnerability.",
"product_ids": [
"CSAFPID-278404",
"CSAFPID-190024",
"CSAFPID-280012",
"CSAFPID-280019",
"CSAFPID-278888",
"CSAFPID-277607"
],
"url": "https://software.cisco.com"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-190024",
"CSAFPID-277607",
"CSAFPID-280012",
"CSAFPID-278888",
"CSAFPID-278404"
]
}
],
"title": "vuln-CVE-2020-26146"
},
{
"cve": "CVE-2020-26147",
"ids": [
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62884"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62876"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx89821"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62886"
}
],
"notes": [
{
"category": "other",
"text": "Complete.",
"title": "Affected Product Comprehensiveness"
}
],
"product_status": {
"known_affected": [
"CSAFPID-277607",
"CSAFPID-278404",
"CSAFPID-278888"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Cisco has released software updates that address this vulnerability.",
"product_ids": [
"CSAFPID-278404",
"CSAFPID-278888",
"CSAFPID-277607"
],
"url": "https://software.cisco.com"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-277607",
"CSAFPID-278404",
"CSAFPID-278888"
]
}
],
"title": "vuln-CVE-2020-26147"
},
{
"cve": "CVE-2020-26140",
"ids": [
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62884"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62876"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx89821"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62886"
}
],
"notes": [
{
"category": "other",
"text": "Complete.",
"title": "Affected Product Comprehensiveness"
}
],
"product_status": {
"known_affected": [
"CSAFPID-277607",
"CSAFPID-278404",
"CSAFPID-278888"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Cisco has released software updates that address this vulnerability.",
"product_ids": [
"CSAFPID-278404",
"CSAFPID-278888",
"CSAFPID-277607"
],
"url": "https://software.cisco.com"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-277607",
"CSAFPID-278404",
"CSAFPID-278888"
]
}
],
"title": "vuln-CVE-2020-26140"
},
{
"cve": "CVE-2020-26142",
"ids": [
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62884"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62876"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx89821"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62886"
}
],
"notes": [
{
"category": "other",
"text": "Complete.",
"title": "Affected Product Comprehensiveness"
}
],
"product_status": {
"known_affected": [
"CSAFPID-277607",
"CSAFPID-278404",
"CSAFPID-278888"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Cisco has released software updates that address this vulnerability.",
"product_ids": [
"CSAFPID-278404",
"CSAFPID-278888",
"CSAFPID-277607"
],
"url": "https://software.cisco.com"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-277607",
"CSAFPID-278404",
"CSAFPID-278888"
]
}
],
"title": "vuln-CVE-2020-26142"
},
{
"cve": "CVE-2020-26143",
"ids": [
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62884"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62876"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62886"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx89821"
}
],
"notes": [
{
"category": "other",
"text": "Complete.",
"title": "Affected Product Comprehensiveness"
}
],
"product_status": {
"known_affected": [
"CSAFPID-277607",
"CSAFPID-278888",
"CSAFPID-278404"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Cisco has released software updates that address this vulnerability.",
"product_ids": [
"CSAFPID-278404",
"CSAFPID-278888",
"CSAFPID-277607"
],
"url": "https://software.cisco.com"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-277607",
"CSAFPID-278888",
"CSAFPID-278404"
]
}
],
"title": "vuln-CVE-2020-26143"
},
{
"cve": "CVE-2020-26145",
"ids": [
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62884"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62876"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62886"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx89821"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24420"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24428"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24439"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24456"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24452"
}
],
"notes": [
{
"category": "other",
"text": "Complete.",
"title": "Affected Product Comprehensiveness"
}
],
"product_status": {
"known_affected": [
"CSAFPID-277607",
"CSAFPID-278888",
"CSAFPID-278404",
"CSAFPID-190024",
"CSAFPID-280012",
"CSAFPID-280019"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Cisco has released software updates that address this vulnerability.",
"product_ids": [
"CSAFPID-278404",
"CSAFPID-190024",
"CSAFPID-280012",
"CSAFPID-280019",
"CSAFPID-278888",
"CSAFPID-277607"
],
"url": "https://software.cisco.com"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-277607",
"CSAFPID-278888",
"CSAFPID-278404"
]
}
],
"title": "vuln-CVE-2020-26145"
},
{
"cve": "CVE-2020-26139",
"ids": [
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62884"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62876"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62886"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx89821"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24420"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24428"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24439"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24456"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24452"
}
],
"notes": [
{
"category": "other",
"text": "Complete.",
"title": "Affected Product Comprehensiveness"
}
],
"product_status": {
"known_affected": [
"CSAFPID-277607",
"CSAFPID-278888",
"CSAFPID-278404",
"CSAFPID-190024",
"CSAFPID-280012",
"CSAFPID-280019"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Cisco has released software updates that address this vulnerability.",
"product_ids": [
"CSAFPID-278404",
"CSAFPID-190024",
"CSAFPID-280012",
"CSAFPID-280019",
"CSAFPID-278888",
"CSAFPID-277607"
],
"url": "https://software.cisco.com"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-277607",
"CSAFPID-278888",
"CSAFPID-278404"
]
}
],
"title": "Forwarding EAPOL frames even though the sender is not yet authenticated"
},
{
"cve": "CVE-2020-24587",
"ids": [
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62884"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62876"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx89821"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62886"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24420"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24428"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24425"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24439"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24456"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24449"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvy32680"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24452"
}
],
"notes": [
{
"category": "other",
"text": "Complete.",
"title": "Affected Product Comprehensiveness"
}
],
"product_status": {
"known_affected": [
"CSAFPID-277607",
"CSAFPID-278404",
"CSAFPID-278888",
"CSAFPID-280012",
"CSAFPID-190024",
"CSAFPID-280019"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Cisco has released software updates that address this vulnerability.",
"product_ids": [
"CSAFPID-278404",
"CSAFPID-190024",
"CSAFPID-280012",
"CSAFPID-280019",
"CSAFPID-278888",
"CSAFPID-277607"
],
"url": "https://software.cisco.com"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-277607",
"CSAFPID-278404",
"CSAFPID-278888"
]
}
],
"title": "Mixed Key Attack Against Fragmentation"
},
{
"cve": "CVE-2020-24586",
"ids": [
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24428"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24425"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24439"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24441"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24456"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24449"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvy32680"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24452"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62884"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62876"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx60997"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx61001"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx61012"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62886"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx61020"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx89821"
}
],
"notes": [
{
"category": "other",
"text": "Complete.",
"title": "Affected Product Comprehensiveness"
}
],
"product_status": {
"known_affected": [
"CSAFPID-280012",
"CSAFPID-190024",
"CSAFPID-277607",
"CSAFPID-278404",
"CSAFPID-278888",
"CSAFPID-280019"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Cisco has released software updates that address this vulnerability.",
"product_ids": [
"CSAFPID-278404",
"CSAFPID-190024",
"CSAFPID-280012",
"CSAFPID-280019",
"CSAFPID-278888",
"CSAFPID-277607"
],
"url": "https://software.cisco.com"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-280012",
"CSAFPID-190024",
"CSAFPID-277607",
"CSAFPID-278404",
"CSAFPID-278888"
]
}
],
"title": "Fragment Cache Attack"
},
{
"cve": "CVE-2020-24588",
"ids": [
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24420"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24428"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24425"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24423"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24439"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24456"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24452"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvy32690"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62884"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62876"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx89821"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62886"
}
],
"notes": [
{
"category": "other",
"text": "Complete.",
"title": "Affected Product Comprehensiveness"
}
],
"product_status": {
"known_affected": [
"CSAFPID-190024",
"CSAFPID-280012",
"CSAFPID-277607",
"CSAFPID-278404",
"CSAFPID-278888",
"CSAFPID-280019"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Cisco has released software updates that address this vulnerability.",
"product_ids": [
"CSAFPID-278404",
"CSAFPID-190024",
"CSAFPID-280012",
"CSAFPID-280019",
"CSAFPID-278888",
"CSAFPID-277607"
],
"url": "https://software.cisco.com"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-190024",
"CSAFPID-280012",
"CSAFPID-277607",
"CSAFPID-278404",
"CSAFPID-278888"
]
}
],
"title": "A-MSDU Design Flaw"
}
]
}
cisco-sa-wifi-faf-22epcEWu
Vulnerability from csaf_cisco
Notes
{
"document": {
"acknowledgments": [
{
"summary": "These vulnerabilities were reported to Cisco by Dr. Mathy Vanhoef of New York University Abu Dhabi. Cisco would like to thank Dr. Vanhoef for his continued help and support during the handling of these vulnerabilities."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"notes": [
{
"category": "summary",
"text": "On May 11, 2021, the research paper Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation was made public. This paper discusses 12 vulnerabilities in the 802.11 standard. One vulnerability is in the frame aggregation functionality, two vulnerabilities are in the frame fragmentation functionality, and the other nine are implementation vulnerabilities. These vulnerabilities could allow an attacker to forge encrypted frames, which could in turn enable the exfiltration of sensitive data from a targeted device.\r\n\r\nThis advisory will be updated as additional information becomes available.\r\n\r\n",
"title": "Summary"
},
{
"category": "general",
"text": "Cisco is investigating its product line to determine which products may be affected by these vulnerabilities. As the investigation progresses, Cisco will update this advisory with information about affected products.",
"title": "Affected Products"
},
{
"category": "general",
"text": "The following table lists Cisco products that are affected by the vulnerabilities that are described in this advisory. If a future release date is indicated for software, the date provided represents an estimate based on all information known to Cisco as of the Last Updated date at the top of the advisory. Availability dates are subject to change based on a number of factors, including satisfactory testing results and delivery of other priority features and fixes. If no version or date is listed for an affected component (indicated by a blank field and/or an advisory designation of Interim), Cisco is continuing to evaluate the fix and will update the advisory as additional information becomes available. After the advisory is marked Final, customers should refer to the associated Cisco bug(s) for further details.\r\n CVE ID Cisco Bug ID Fixed Release Availability [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"] Aironet 1532 APs, AP803 Integrated AP on IR829 Industrial Integrated Services Routers CVE-2020-24586 CSCvy32690 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy32690\"] 8.5MR8\r\n8.10MR6 CVE-2020-24587 CSCvy32690 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy32690\"] 8.5MR8\r\n8.10MR6 CVE-2020-24588 CSCvy32690 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy32690\"] 8.5MR8\r\n8.10MR6 CVE-2020-26139 Not affected N/A CVE-2020-26140 Not affected N/A CVE-2020-26141 Not affected N/A CVE-2020-26142 Not affected N/A CVE-2020-26143 Not affected N/A CVE-2020-26144 Not affected N/A CVE-2020-26145 Not affected N/A CVE-2020-26146 Not affected N/A CVE-2020-26147 Not affected N/A Aironet 1542 APs, Aironet 1810 APs, Aironet 1815 APs, Aironet 1832 APs, Aironet 1842 APs, Aironet 1852 APs, Aironet 1800i APs CVE-2020-24586 Not affected N/A CVE-2020-24587 CSCvx24420 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24420\"] 8.5MR8\r\n8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-24588 CSCvx24420 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24420\"] 8.5MR8\r\n8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26139 CSCvx24420 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24420\"] 8.5MR8\r\n8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26140 Not affected N/A CVE-2020-26141 Not affected N/A CVE-2020-26142 Not affected N/A CVE-2020-26143 Not affected N/A CVE-2020-26144 Not affected N/A CVE-2020-26145 CSCvx24420 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24420\"] 8.5MR8\r\n8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26146 CSCvx24420 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24420\"] 8.5MR8\r\n8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26147 Not affected N/A Aironet 1552 APs, Aironet 1552H APs, Aironet 1572 APs, Aironet 1702 APs, Aironet 2702 APs, Aironet 3702 APs, IW 3702 APs CVE-2020-24586 CSCvy32680 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy32680\"] 8.5MR8\r\n8.10MR6\r\n16.12.6\r\n17.3.4 CVE-2020-24587 CSCvy32680 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy32680\"] 8.5MR8\r\n8.10MR6\r\n16.12.6\r\n17.3.4 CVE-2020-24588 Not affected N/A CVE-2020-26139 Not affected N/A CVE-2020-26140 Not affected N/A CVE-2020-26141 Not affected N/A CVE-2020-26142 Not affected N/A CVE-2020-26143 Not affected N/A CVE-2020-26144 Not affected N/A CVE-2020-26145 Not affected N/A CVE-2020-26146 Not affected N/A CVE-2020-26147 Not affected N/A Aironet 1560 Series APs, Aironet 2800 Series APs, Aironet Series 3800 APs, Aironet Series 4800 APs, Catalyst IW 6300 APs, 6300 Series Embedded Services APs (ESW6300) CVE-2020-24586 CSCvx24449 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24449\"] 8.5MR8\r\n8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-24587 CSCvx24449 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24449\"] 8.5MR8\r\n8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-24588 Not affected N/A CVE-2020-26139 Not affected N/A CVE-2020-26140 CSCvy36698 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy36698\"] 8.5MR8\r\n8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26141 Not affected N/A CVE-2020-26142 Not affected N/A CVE-2020-26143 CSCvy36698 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy36698\"] 8.5MR8\r\n8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26144 Not affected N/A CVE-2020-26145 Not affected N/A CVE-2020-26146 CSCvy36698 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy36698\"] 8.5MR8\r\n8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26147 CSCvy36698 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy36698\"] 8.5MR8\r\n8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 Catalyst 9105 APs, Catalyst 9115 APs, Catalyst 9120 APs, Integrated AP on 1100 Integrated Services Routers CVE-2020-24586 CSCvx24425 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24425\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-24587 CSCvx24425 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24425\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-24588 CSCvx24425 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24425\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26139 Not affected N/A CVE-2020-26140 Not affected N/A CVE-2020-26141 Not affected N/A CVE-2020-26142 Not affected N/A CVE-2020-26143 Not affected N/A CVE-2020-26144 Not affected N/A CVE-2020-26145 Not affected N/A CVE-2020-26146 Not affected N/A CVE-2020-26147 Not affected N/A Catalyst 9117 APs CVE-2020-24586 CSCvx24439 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24439\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-24587 CSCvx24439 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24439\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-24588 CSCvx24439 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24439\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26139 CSCvx24439 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24439\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26140 Not affected N/A CVE-2020-26141 Not affected N/A CVE-2020-26142 Not affected N/A CVE-2020-26143 Not affected N/A CVE-2020-26144 CSCvx24439 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24439\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26145 CSCvx24439 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24439\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26146 CSCvx24439 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24439\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26147 Not affected N/A Catalyst 9124 APs1, Catalyst 9130 APs CVE-2020-24586 CSCvx24428 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24428\"]\r\nCSCvx24452 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24452\"]\r\nCSCvx24456 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24456\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-24587 CSCvx24428 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24428\"]\r\nCSCvx24452 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24452\"]\r\nCSCvx24456 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24456\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-24588 CSCvx24428 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24428\"]\r\nCSCvx24452 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24452\"]\r\nCSCvx24456 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24456\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26139 CSCvx24428 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24428\"]\r\nCSCvx24452 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24452\"]\r\nCSCvx24456 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24456\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26140 Not affected N/A CVE-2020-26141 Not affected N/A CVE-2020-26142 Not affected N/A CVE-2020-26143 Not affected N/A CVE-2020-26144 CSCvx24428 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24428\"]\r\nCSCvx24452 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24452\"]\r\nCSCvx24456 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24456\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26145 CSCvx24428 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24428\"]\r\nCSCvx24452 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24452\"]\r\nCSCvx24456 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24456\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26146 CSCvx24428 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24428\"]\r\nCSCvx24452 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24452\"]\r\nCSCvx24456 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24456\"] 8.10MR6\r\n16.12.6\r\n17.3.4\r\n17.6.1 CVE-2020-26147 Not affected N/A 1. Catalyst 9124 APs were not supported until Release 17.5, and the fix will be available in Release 17.6.1 Meraki GR10, GR60, MR20, MR30H, MR33, MR36, MR42, MR42E, MR44, MR45, MR46, MR46E, MR52, MR53, MR53E, MR55, MR56, MR70, MR74, MR76, MR84, MR86 CVE-2020-24586 No bug ID MR 27.7.1 CVE-2020-24587 No bug ID MR 27.7.1 CVE-2020-24588 No bug ID MR 27.7.1 CVE-2020-26139 No bug ID MR 27.7.1 CVE-2020-26140 No bug ID MR 27.7.1 CVE-2020-26141 No bug ID MR 27.7.1 CVE-2020-26142 No bug ID MR 27.7.1 CVE-2020-26143 No bug ID MR 27.7.1 CVE-2020-26144 No bug ID MR 27.7.1 CVE-2020-26145 No bug ID MR 27.7.1 CVE-2020-26146 No bug ID MR 27.7.1 CVE-2020-26147 No bug ID MR 27.7.1 Meraki MR12, MR18, MR26, MR32, MR34, MR62, MR66, MR72 CVE-2020-24586 No bug ID MR 26.8.3 CVE-2020-24587 No bug ID MR 26.8.3 CVE-2020-24588 No bug ID MR 26.8.3 CVE-2020-26139 No bug ID MR 26.8.3 CVE-2020-26140 No bug ID MR 26.8.3 CVE-2020-26141 No bug ID MR 26.8.3 CVE-2020-26142 No bug ID MR 26.8.3 CVE-2020-26143 No bug ID MR 26.8.3 CVE-2020-26144 No bug ID MR 26.8.3 CVE-2020-26145 No bug ID MR 26.8.3 CVE-2020-26146 No bug ID MR 26.8.3 CVE-2020-26147 No bug ID MR 26.8.3 Meraki MX64W, MX65W, MX67W, MX67CW, MX68W, MX68CW, Z3, Z3C1 CVE-2020-24586 No bug ID MX 17.0 CVE-2020-24587 No bug ID MX 17.0 CVE-2020-24588 No bug ID MX 17.0 CVE-2020-26139 No bug ID MX 17.0 CVE-2020-26140 No bug ID MX 17.0 CVE-2020-26141 No bug ID MX 17.0 CVE-2020-26142 No bug ID MX 17.0 CVE-2020-26143 No bug ID MX 17.0 CVE-2020-26144 No bug ID MX 17.0 CVE-2020-26145 No bug ID MX 17.0 CVE-2020-26146 No bug ID MX 17.0 CVE-2020-26147 No bug ID MX 17.0 1. Cisco will not fix these vulnerabilities in the following Cisco Meraki products: MX60W and Z1 IP Phone 8861, IP Phone 8865, and IP Conference Phone 8832 CVE-2020-24586 CSCvx60997 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997\"] 14.1(1) CVE-2020-24587 CSCvx60997 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997\"] 14.1(1) CVE-2020-24588 CSCvx60997 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997\"] 14.1(1) CVE-2020-26139 CSCvx60997 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997\"] 14.1(1) CVE-2020-26140 CSCvx60997 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997\"] 14.1(1) CVE-2020-26141 CSCvx60997 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997\"] 14.1(1) CVE-2020-26142 CSCvx60997 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997\"] 14.1(1) CVE-2020-26143 CSCvx60997 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997\"] 14.1(1) CVE-2020-26144 CSCvx60997 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997\"] 14.1(1) CVE-2020-26145 CSCvx60997 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997\"] 14.1(1) CVE-2020-26146 CSCvx60997 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997\"] 14.1(1) CVE-2020-26147 CSCvx60997 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997\"] 14.1(1) IP Phone 6861 and IP Phone 8861 Running Third-Party Call Control (3PCC) Software CVE-2020-24586 CSCvx61001 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001\"] 11.3(5) CVE-2020-24587 CSCvx61001 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001\"] 11.3(5) CVE-2020-24588 CSCvx61001 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001\"] 11.3(5) CVE-2020-26139 CSCvx61001 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001\"] 11.3(5) CVE-2020-26140 CSCvx61001 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001\"] 11.3(5) CVE-2020-26141 CSCvx61001 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001\"] 11.3(5) CVE-2020-26142 CSCvx61001 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001\"] 11.3(5) CVE-2020-26143 CSCvx61001 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001\"] 11.3(5) CVE-2020-26144 CSCvx61001 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001\"] 11.3(5) CVE-2020-26145 CSCvx61001 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001\"] 11.3(5) CVE-2020-26146 CSCvx61001 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001\"] 11.3(5) CVE-2020-26147 CSCvx61001 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001\"] 11.3(5) Wireless IP Phone 8821 CVE-2020-24586 CSCvx61012 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012\"] 11.0(6)SR2 CVE-2020-24587 CSCvx61012 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012\"] 11.0(6)SR2 CVE-2020-24588 CSCvx61012 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012\"] 11.0(6)SR2 CVE-2020-26139 CSCvx61012 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012\"] 11.0(6)SR2 CVE-2020-26140 CSCvx61012 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012\"] 11.0(6)SR2 CVE-2020-26141 CSCvx61012 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012\"] 11.0(6)SR2 CVE-2020-26142 CSCvx61012 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012\"] 11.0(6)SR2 CVE-2020-26143 CSCvx61012 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012\"] 11.0(6)SR2 CVE-2020-26144 CSCvx61012 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012\"] 11.0(6)SR2 CVE-2020-26145 CSCvx61012 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012\"] 11.0(6)SR2 CVE-2020-26146 CSCvx61012 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012\"] 11.0(6)SR2 CVE-2020-26147 CSCvx61012 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012\"] 11.0(6)SR2 Webex Desk Series and Webex Room Series CVE-2020-24586 CSCvx89821 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821\"] 1.2(0)SR1 CVE-2020-24587 CSCvx89821 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821\"] 1.2(0)SR1 CVE-2020-24588 CSCvx89821 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821\"] 1.2(0)SR1 CVE-2020-26139 CSCvx89821 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821\"] 1.2(0)SR1 CVE-2020-26140 CSCvx89821 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821\"] 1.2(0)SR1 CVE-2020-26141 CSCvx89821 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821\"] 1.2(0)SR1 CVE-2020-26142 CSCvx89821 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821\"] 1.2(0)SR1 CVE-2020-26143 CSCvx89821 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821\"] 1.2(0)SR1 CVE-2020-26144 CSCvx89821 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821\"] 1.2(0)SR1 CVE-2020-26145 CSCvx89821 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821\"] 1.2(0)SR1 CVE-2020-26146 CSCvx89821 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821\"] 1.2(0)SR1 CVE-2020-26147 CSCvx89821 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821\"] 1.2(0)SR1 Webex Board Series CVE-2020-24586 CSCvx61020 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020\"] 10.8.2.5 CVE-2020-24587 CSCvx61020 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020\"] 10.8.2.5 CVE-2020-24588 CSCvx61020 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020\"] 10.8.2.5 CVE-2020-26139 CSCvx61020 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020\"] 10.8.2.5 CVE-2020-26140 CSCvx61020 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020\"] 10.8.2.5 CVE-2020-26141 CSCvx61020 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020\"] 10.8.2.5 CVE-2020-26142 CSCvx61020 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020\"] 10.8.2.5 CVE-2020-26143 CSCvx61020 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020\"] 10.8.2.5 CVE-2020-26144 CSCvx61020 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020\"] 10.8.2.5 CVE-2020-26145 CSCvx61020 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020\"] 10.8.2.5 CVE-2020-26146 CSCvx61020 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020\"] 10.8.2.5 CVE-2020-26147 CSCvx61020 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020\"] 10.8.2.5 Webex Wireless Phone 840 and 860 CVE-2020-24586 CSCvx62886 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886\"] 1.4(0) CVE-2020-24587 CSCvx62886 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886\"] 1.4(0) CVE-2020-24588 CSCvx62886 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886\"] 1.4(0) CVE-2020-26139 CSCvx62886 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886\"] 1.4(0) CVE-2020-26140 CSCvx62886 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886\"] 1.4(0) CVE-2020-26141 CSCvx62886 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886\"] 1.4(0) CVE-2020-26142 CSCvx62886 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886\"] 1.4(0) CVE-2020-26143 CSCvx62886 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886\"] 1.4(0) CVE-2020-26144 CSCvx62886 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886\"] 1.4(0) CVE-2020-26145 CSCvx62886 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886\"] 1.4(0) CVE-2020-26146 CSCvx62886 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886\"] 1.4(0) CVE-2020-26147 CSCvx62886 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886\"] 1.4(0)",
"title": "Vulnerable Products"
},
{
"category": "general",
"text": "Only products listed in the Vulnerable Products [\"#vp\"] section of this advisory are known to be affected by this vulnerability.",
"title": "Products Confirmed Not Vulnerable"
},
{
"category": "general",
"text": "The vulnerabilities are not dependent on one another. Exploitation of one of the vulnerabilities is not required to exploit another vulnerability. In addition, a software release that is affected by one of the vulnerabilities may not be affected by the other vulnerabilities.\r\n\r\nFor a description of the following vulnerabilities, see Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation [\"https://papers.mathyvanhoef.com/usenix2021.pdf\"].\r\n\r\nFor additional information, see FragAttacks [\"https://fragattacks.com/\"].\r\n\r\nCVE-2020-26140: Accepting plaintext data frames in a protected network\r\n\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 6.5\r\nCVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N\r\n\r\nCVE-2020-26143: Accepting fragmented plaintext data frames in a protected network\r\n\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 6.5\r\nCVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N\r\n\r\nCVE-2020-26144: Accepting plaintext A-MSDU frames that start with an RFC1042 header with EtherType EAPOL (in an encrypted network)\r\n\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 6.5\r\nCVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N\r\n\r\nCVE-2020-26145: Accepting plaintext broadcast fragments as full frames (in an encrypted network)\r\n\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 6.5\r\nCVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N\r\n\r\nCVE-2020-24586: Not clearing fragments from memory when (re)connecting to a network\r\n\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 5.7\r\nCVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N\r\n\r\nCVE-2020-24588: Accepting non-SPP A-MSDU frames\r\n\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 5.7\r\nCVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N\r\n\r\nCVE-2020-26139: Forwarding EAPOL frames even though the sender is not yet authenticated\r\n\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 5.7\r\nCVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L\r\n\r\nCVE-2020-26141: Not verifying the TKIP MIC of fragmented frames\r\n\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 5.7\r\nCVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N\r\n\r\nCVE-2020-26142: Processing fragmented frames as full frames\r\n\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 5.7\r\nCVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N\r\n\r\nCVE-2020-24587: Reassembling fragments encrypted under different keys\r\n\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 4.8\r\nCVSS Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N\r\n\r\nCVE-2020-26146: Reassembling encrypted fragments with non-consecutive packet numbers\r\n\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 4.8\r\nCVSS Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N\r\n\r\nCVE-2020-26147: Reassembling mixed encrypted/plaintext fragments\r\n\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 4.8\r\nCVSS Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N",
"title": "Details"
},
{
"category": "general",
"text": "There are no workarounds that address these vulnerabilities.",
"title": "Workarounds"
},
{
"category": "general",
"text": "For information about fixed software releases [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], consult the Cisco bugs identified in the Vulnerable Products [\"#vp\"] section of this advisory.\r\n\r\nWhen considering software upgrades [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page [\"https://www.cisco.com/go/psirt\"], to determine exposure and a complete upgrade solution.\r\n\r\nIn all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.",
"title": "Fixed Software"
},
{
"category": "general",
"text": "To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html\"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.",
"title": "Vulnerability Policy"
},
{
"category": "general",
"text": "The Cisco Product Security Incident Response Team (PSIRT) is aware that proof-of-concept exploit code is available for the vulnerabilities that are described in this advisory.\r\n\r\nThe Cisco PSIRT is not aware of any malicious use of the vulnerabilities that are described in this advisory.",
"title": "Exploitation and Public Announcements"
},
{
"category": "general",
"text": "These vulnerabilities were reported to Cisco by Dr. Mathy Vanhoef of New York University Abu Dhabi. Cisco would like to thank Dr. Vanhoef for his continued help and support during the handling of these vulnerabilities.",
"title": "Source"
},
{
"category": "legal_disclaimer",
"text": "THIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.\r\n\r\nA standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.",
"title": "Legal Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "psirt@cisco.com",
"issuing_authority": "Cisco PSIRT",
"name": "Cisco",
"namespace": "https://wwww.cisco.com"
},
"references": [
{
"category": "self",
"summary": "Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu"
},
{
"category": "external",
"summary": "Cisco Security Vulnerability Policy",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html"
},
{
"category": "external",
"summary": "Fixed Release Availability",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes"
},
{
"category": "external",
"summary": "CSCvy32690",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy32690"
},
{
"category": "external",
"summary": "CSCvx24420",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24420"
},
{
"category": "external",
"summary": "CSCvy32680",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy32680"
},
{
"category": "external",
"summary": "CSCvx24449",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24449"
},
{
"category": "external",
"summary": "CSCvy36698",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy36698"
},
{
"category": "external",
"summary": "CSCvx24425",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24425"
},
{
"category": "external",
"summary": "CSCvx24439",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24439"
},
{
"category": "external",
"summary": "CSCvx24428",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24428"
},
{
"category": "external",
"summary": "CSCvx24452",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24452"
},
{
"category": "external",
"summary": "CSCvx24456",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24456"
},
{
"category": "external",
"summary": "CSCvx60997",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx60997"
},
{
"category": "external",
"summary": "CSCvx61001",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61001"
},
{
"category": "external",
"summary": "CSCvx61012",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61012"
},
{
"category": "external",
"summary": "CSCvx89821",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx89821"
},
{
"category": "external",
"summary": "CSCvx61020",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx61020"
},
{
"category": "external",
"summary": "CSCvx62886",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx62886"
},
{
"category": "external",
"summary": "Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation",
"url": "https://papers.mathyvanhoef.com/usenix2021.pdf"
},
{
"category": "external",
"summary": "FragAttacks",
"url": "https://fragattacks.com/"
},
{
"category": "external",
"summary": "Cisco\u0026nbsp;Security Advisories page",
"url": "https://www.cisco.com/go/psirt"
}
],
"title": "Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021",
"tracking": {
"current_release_date": "2021-12-15T15:47:26+00:00",
"generator": {
"date": "2024-05-10T23:04:25+00:00",
"engine": {
"name": "TVCE"
}
},
"id": "cisco-sa-wifi-faf-22epcEWu",
"initial_release_date": "2021-05-11T18:00:00+00:00",
"revision_history": [
{
"date": "2021-05-10T16:33:53+00:00",
"number": "1.0.0",
"summary": "Initial public release."
},
{
"date": "2021-05-11T21:59:40+00:00",
"number": "1.1.0",
"summary": "Updated affected Meraki MR products."
},
{
"date": "2021-05-14T20:43:24+00:00",
"number": "1.2.0",
"summary": "Added additional affected products."
},
{
"date": "2021-05-17T17:42:47+00:00",
"number": "1.3.0",
"summary": "Added additional affected products."
},
{
"date": "2021-05-19T20:50:42+00:00",
"number": "1.4.0",
"summary": "Added additional fixed releases."
},
{
"date": "2021-06-02T20:48:21+00:00",
"number": "1.5.0",
"summary": "Update affected products."
},
{
"date": "2021-07-13T18:42:53+00:00",
"number": "1.6.0",
"summary": "Added additional fixed releases for Meraki products."
},
{
"date": "2021-08-30T19:06:07+00:00",
"number": "1.7.0",
"summary": "Updated fixed release details for multiple products."
},
{
"date": "2021-10-05T14:54:59+00:00",
"number": "1.8.0",
"summary": "Updated fixed release details for Aironet 1532/AP803 products."
},
{
"date": "2021-12-15T15:47:26+00:00",
"number": "1.9.0",
"summary": "Updated fixed releases."
}
],
"status": "final",
"version": "1.9.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_family",
"name": "Cisco Aironet Access Point Software",
"product": {
"name": "Cisco Aironet Access Point Software ",
"product_id": "CSAFPID-190024"
}
},
{
"category": "product_family",
"name": "Cisco IP Phones with Multiplatform Firmware",
"product": {
"name": "Cisco IP Phones with Multiplatform Firmware ",
"product_id": "CSAFPID-277607"
}
},
{
"category": "product_family",
"name": "Cisco TelePresence Endpoint Software (TC/CE)",
"product": {
"name": "Cisco TelePresence Endpoint Software (TC/CE) ",
"product_id": "CSAFPID-278404"
}
},
{
"category": "product_family",
"name": "Cisco Webex Room Phone",
"product": {
"name": "Cisco Webex Room Phone ",
"product_id": "CSAFPID-278888"
}
},
{
"category": "product_family",
"name": "Cisco Business Wireless Access Point Software",
"product": {
"name": "Cisco Business Wireless Access Point Software ",
"product_id": "CSAFPID-280012"
}
},
{
"category": "product_family",
"name": "Cisco Aironet Access Point Software (IOS XE Controller)",
"product": {
"name": "Cisco Aironet Access Point Software (IOS XE Controller) ",
"product_id": "CSAFPID-280019"
}
}
],
"category": "vendor",
"name": "Cisco"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-26144",
"ids": [
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62884"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62876"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx89821"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62886"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24452"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24428"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24439"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24456"
}
],
"notes": [
{
"category": "other",
"text": "Complete.",
"title": "Affected Product Comprehensiveness"
}
],
"product_status": {
"known_affected": [
"CSAFPID-277607",
"CSAFPID-278404",
"CSAFPID-278888",
"CSAFPID-280019",
"CSAFPID-190024",
"CSAFPID-280012"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Cisco has released software updates that address this vulnerability.",
"product_ids": [
"CSAFPID-278404",
"CSAFPID-190024",
"CSAFPID-280012",
"CSAFPID-280019",
"CSAFPID-278888",
"CSAFPID-277607"
],
"url": "https://software.cisco.com"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-277607",
"CSAFPID-278404",
"CSAFPID-278888"
]
}
],
"title": "vuln-CVE-2020-26144"
},
{
"cve": "CVE-2020-26141",
"ids": [
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62884"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62876"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx89821"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62886"
}
],
"notes": [
{
"category": "other",
"text": "Complete.",
"title": "Affected Product Comprehensiveness"
}
],
"product_status": {
"known_affected": [
"CSAFPID-277607",
"CSAFPID-278404",
"CSAFPID-278888"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Cisco has released software updates that address this vulnerability.",
"product_ids": [
"CSAFPID-278404",
"CSAFPID-278888",
"CSAFPID-277607"
],
"url": "https://software.cisco.com"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-277607",
"CSAFPID-278404",
"CSAFPID-278888"
]
}
],
"title": "vuln-CVE-2020-26141"
},
{
"cve": "CVE-2020-26146",
"ids": [
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24420"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24425"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24439"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24441"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24440"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24449"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvy32694"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62884"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62876"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62886"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx89821"
}
],
"notes": [
{
"category": "other",
"text": "Complete.",
"title": "Affected Product Comprehensiveness"
}
],
"product_status": {
"known_affected": [
"CSAFPID-190024",
"CSAFPID-277607",
"CSAFPID-280012",
"CSAFPID-278888",
"CSAFPID-278404",
"CSAFPID-280019"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Cisco has released software updates that address this vulnerability.",
"product_ids": [
"CSAFPID-278404",
"CSAFPID-190024",
"CSAFPID-280012",
"CSAFPID-280019",
"CSAFPID-278888",
"CSAFPID-277607"
],
"url": "https://software.cisco.com"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-190024",
"CSAFPID-277607",
"CSAFPID-280012",
"CSAFPID-278888",
"CSAFPID-278404"
]
}
],
"title": "vuln-CVE-2020-26146"
},
{
"cve": "CVE-2020-26147",
"ids": [
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62884"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62876"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx89821"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62886"
}
],
"notes": [
{
"category": "other",
"text": "Complete.",
"title": "Affected Product Comprehensiveness"
}
],
"product_status": {
"known_affected": [
"CSAFPID-277607",
"CSAFPID-278404",
"CSAFPID-278888"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Cisco has released software updates that address this vulnerability.",
"product_ids": [
"CSAFPID-278404",
"CSAFPID-278888",
"CSAFPID-277607"
],
"url": "https://software.cisco.com"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-277607",
"CSAFPID-278404",
"CSAFPID-278888"
]
}
],
"title": "vuln-CVE-2020-26147"
},
{
"cve": "CVE-2020-26140",
"ids": [
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62884"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62876"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx89821"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62886"
}
],
"notes": [
{
"category": "other",
"text": "Complete.",
"title": "Affected Product Comprehensiveness"
}
],
"product_status": {
"known_affected": [
"CSAFPID-277607",
"CSAFPID-278404",
"CSAFPID-278888"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Cisco has released software updates that address this vulnerability.",
"product_ids": [
"CSAFPID-278404",
"CSAFPID-278888",
"CSAFPID-277607"
],
"url": "https://software.cisco.com"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-277607",
"CSAFPID-278404",
"CSAFPID-278888"
]
}
],
"title": "vuln-CVE-2020-26140"
},
{
"cve": "CVE-2020-26142",
"ids": [
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62884"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62876"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx89821"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62886"
}
],
"notes": [
{
"category": "other",
"text": "Complete.",
"title": "Affected Product Comprehensiveness"
}
],
"product_status": {
"known_affected": [
"CSAFPID-277607",
"CSAFPID-278404",
"CSAFPID-278888"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Cisco has released software updates that address this vulnerability.",
"product_ids": [
"CSAFPID-278404",
"CSAFPID-278888",
"CSAFPID-277607"
],
"url": "https://software.cisco.com"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-277607",
"CSAFPID-278404",
"CSAFPID-278888"
]
}
],
"title": "vuln-CVE-2020-26142"
},
{
"cve": "CVE-2020-26143",
"ids": [
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62884"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62876"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62886"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx89821"
}
],
"notes": [
{
"category": "other",
"text": "Complete.",
"title": "Affected Product Comprehensiveness"
}
],
"product_status": {
"known_affected": [
"CSAFPID-277607",
"CSAFPID-278888",
"CSAFPID-278404"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Cisco has released software updates that address this vulnerability.",
"product_ids": [
"CSAFPID-278404",
"CSAFPID-278888",
"CSAFPID-277607"
],
"url": "https://software.cisco.com"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-277607",
"CSAFPID-278888",
"CSAFPID-278404"
]
}
],
"title": "vuln-CVE-2020-26143"
},
{
"cve": "CVE-2020-26145",
"ids": [
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62884"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62876"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62886"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx89821"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24420"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24428"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24439"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24456"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24452"
}
],
"notes": [
{
"category": "other",
"text": "Complete.",
"title": "Affected Product Comprehensiveness"
}
],
"product_status": {
"known_affected": [
"CSAFPID-277607",
"CSAFPID-278888",
"CSAFPID-278404",
"CSAFPID-190024",
"CSAFPID-280012",
"CSAFPID-280019"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Cisco has released software updates that address this vulnerability.",
"product_ids": [
"CSAFPID-278404",
"CSAFPID-190024",
"CSAFPID-280012",
"CSAFPID-280019",
"CSAFPID-278888",
"CSAFPID-277607"
],
"url": "https://software.cisco.com"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-277607",
"CSAFPID-278888",
"CSAFPID-278404"
]
}
],
"title": "vuln-CVE-2020-26145"
},
{
"cve": "CVE-2020-26139",
"ids": [
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62884"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62876"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62886"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx89821"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24420"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24428"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24439"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24456"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24452"
}
],
"notes": [
{
"category": "other",
"text": "Complete.",
"title": "Affected Product Comprehensiveness"
}
],
"product_status": {
"known_affected": [
"CSAFPID-277607",
"CSAFPID-278888",
"CSAFPID-278404",
"CSAFPID-190024",
"CSAFPID-280012",
"CSAFPID-280019"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Cisco has released software updates that address this vulnerability.",
"product_ids": [
"CSAFPID-278404",
"CSAFPID-190024",
"CSAFPID-280012",
"CSAFPID-280019",
"CSAFPID-278888",
"CSAFPID-277607"
],
"url": "https://software.cisco.com"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-277607",
"CSAFPID-278888",
"CSAFPID-278404"
]
}
],
"title": "Forwarding EAPOL frames even though the sender is not yet authenticated"
},
{
"cve": "CVE-2020-24587",
"ids": [
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62884"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62876"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx89821"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62886"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24420"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24428"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24425"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24439"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24456"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24449"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvy32680"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24452"
}
],
"notes": [
{
"category": "other",
"text": "Complete.",
"title": "Affected Product Comprehensiveness"
}
],
"product_status": {
"known_affected": [
"CSAFPID-277607",
"CSAFPID-278404",
"CSAFPID-278888",
"CSAFPID-280012",
"CSAFPID-190024",
"CSAFPID-280019"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Cisco has released software updates that address this vulnerability.",
"product_ids": [
"CSAFPID-278404",
"CSAFPID-190024",
"CSAFPID-280012",
"CSAFPID-280019",
"CSAFPID-278888",
"CSAFPID-277607"
],
"url": "https://software.cisco.com"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-277607",
"CSAFPID-278404",
"CSAFPID-278888"
]
}
],
"title": "Mixed Key Attack Against Fragmentation"
},
{
"cve": "CVE-2020-24586",
"ids": [
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24428"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24425"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24439"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24441"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24456"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24449"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvy32680"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24452"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62884"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62876"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx60997"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx61001"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx61012"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62886"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx61020"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx89821"
}
],
"notes": [
{
"category": "other",
"text": "Complete.",
"title": "Affected Product Comprehensiveness"
}
],
"product_status": {
"known_affected": [
"CSAFPID-280012",
"CSAFPID-190024",
"CSAFPID-277607",
"CSAFPID-278404",
"CSAFPID-278888",
"CSAFPID-280019"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Cisco has released software updates that address this vulnerability.",
"product_ids": [
"CSAFPID-278404",
"CSAFPID-190024",
"CSAFPID-280012",
"CSAFPID-280019",
"CSAFPID-278888",
"CSAFPID-277607"
],
"url": "https://software.cisco.com"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-280012",
"CSAFPID-190024",
"CSAFPID-277607",
"CSAFPID-278404",
"CSAFPID-278888"
]
}
],
"title": "Fragment Cache Attack"
},
{
"cve": "CVE-2020-24588",
"ids": [
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24420"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24428"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24425"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24423"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24439"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24456"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx24452"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvy32690"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62884"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62876"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx89821"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvx62886"
}
],
"notes": [
{
"category": "other",
"text": "Complete.",
"title": "Affected Product Comprehensiveness"
}
],
"product_status": {
"known_affected": [
"CSAFPID-190024",
"CSAFPID-280012",
"CSAFPID-277607",
"CSAFPID-278404",
"CSAFPID-278888",
"CSAFPID-280019"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Cisco has released software updates that address this vulnerability.",
"product_ids": [
"CSAFPID-278404",
"CSAFPID-190024",
"CSAFPID-280012",
"CSAFPID-280019",
"CSAFPID-278888",
"CSAFPID-277607"
],
"url": "https://software.cisco.com"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-190024",
"CSAFPID-280012",
"CSAFPID-277607",
"CSAFPID-278404",
"CSAFPID-278888"
]
}
],
"title": "A-MSDU Design Flaw"
}
]
}
fkie_cve-2020-26145
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://www.openwall.com/lists/oss-security/2021/05/11/12 | Mailing List, Third Party Advisory | |
| cve@mitre.org | https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf | Patch, Third Party Advisory | |
| cve@mitre.org | https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md | Third Party Advisory | |
| cve@mitre.org | https://www.fragattacks.com | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2021/05/11/12 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf | Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.fragattacks.com | Third Party Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| samsung | galaxy_i9305_firmware | 4.4.4 | |
| samsung | galaxy_i9305 | - | |
| siemens | 6gk5763-1al00-7da0_firmware | * | |
| siemens | 6gk5763-1al00-7da0 | - | |
| siemens | 6gk5766-1ge00-7da0_firmware | * | |
| siemens | 6gk5766-1ge00-7da0 | - | |
| siemens | 6gk5766-1ge00-7db0_firmware | * | |
| siemens | 6gk5766-1ge00-7db0 | - | |
| siemens | 6gk5766-1je00-7da0_firmware | * | |
| siemens | 6gk5766-1je00-7da0 | - | |
| siemens | 6gk5766-1ge00-7ta0_firmware | * | |
| siemens | 6gk5766-1ge00-7ta0 | - | |
| siemens | 6gk5766-1ge00-7tb0_firmware | * | |
| siemens | 6gk5766-1ge00-7tb0 | - | |
| siemens | 6gk5766-1je00-7ta0_firmware | * | |
| siemens | 6gk5766-1je00-7ta0 | - | |
| siemens | 6gk5763-1al00-3aa0_firmware | * | |
| siemens | 6gk5763-1al00-3aa0 | - | |
| siemens | 6gk5763-1al00-3da0_firmware | * | |
| siemens | 6gk5763-1al00-3da0 | - | |
| siemens | 6gk5766-1ge00-3da0_firmware | * | |
| siemens | 6gk5766-1ge00-3da0 | - | |
| siemens | 6gk5766-1ge00-3db0_firmware | * | |
| siemens | 6gk5766-1ge00-3db0 | - | |
| siemens | 6gk5766-1je00-3da0_firmware | * | |
| siemens | 6gk5766-1je00-3da0 | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:samsung:galaxy_i9305_firmware:4.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B5CFC281-DDBA-4511-A271-FCFFA337E2B9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:samsung:galaxy_i9305:-:*:*:*:*:*:*:*",
"matchCriteriaId": "79194A52-BFFC-448B-9032-F29D2A5971BE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:6gk5763-1al00-7da0_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9C148549-31FC-48E5-860B-56364F15A9A4",
"versionEndExcluding": "1.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:6gk5763-1al00-7da0:-:*:*:*:*:*:*:*",
"matchCriteriaId": "72E99748-08CA-4515-B64B-A7696E7C9824",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:6gk5766-1ge00-7da0_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B6E3450B-8B5F-4510-8D07-1D5A1BA214E1",
"versionEndExcluding": "1.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:6gk5766-1ge00-7da0:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A9A76803-CFF6-4A82-A5EC-10A3946A91D3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:6gk5766-1ge00-7db0_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7A9D34A4-CBF4-4B78-A20D-33DB7DD3609E",
"versionEndExcluding": "1.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:6gk5766-1ge00-7db0:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9AAE92C7-5197-48AA-9334-62D3E313F8AE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:6gk5766-1je00-7da0_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "74D91A1E-53EE-482B-A3D1-53E955DCDE2E",
"versionEndExcluding": "1.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:6gk5766-1je00-7da0:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6D4F2AD0-57B4-4947-8887-9F26C47909CB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:6gk5766-1ge00-7ta0_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DBD0BD5B-54E2-4A29-8AFE-D4796B65FA2B",
"versionEndExcluding": "1.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:6gk5766-1ge00-7ta0:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4450B377-C7C1-4225-9304-C4AC79AB7E71",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:6gk5766-1ge00-7tb0_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C8852F24-7613-43AA-A91C-4665721C75DA",
"versionEndExcluding": "1.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:6gk5766-1ge00-7tb0:-:*:*:*:*:*:*:*",
"matchCriteriaId": "802CE18D-AF89-46F3-82EF-83F9590A49DA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:6gk5766-1je00-7ta0_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B8040707-3EE4-48CD-BEB0-B11136EC1841",
"versionEndExcluding": "1.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:6gk5766-1je00-7ta0:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BFC81171-3522-4982-BFA8-940E161AF217",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:6gk5763-1al00-3aa0_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "749D2AF5-A5A4-4CBF-98C9-A3AC9C55494E",
"versionEndExcluding": "1.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:6gk5763-1al00-3aa0:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E50D46EE-B0D0-4385-BF21-804CB1B9556C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:6gk5763-1al00-3da0_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "05C27085-76D9-4185-A578-82B71A360731",
"versionEndExcluding": "1.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:6gk5763-1al00-3da0:-:*:*:*:*:*:*:*",
"matchCriteriaId": "781FDDBB-8DCA-4B65-8906-E78FBE3CFDA1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:6gk5766-1ge00-3da0_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7A705BE0-37DB-4D49-AD50-B68CFE273C0D",
"versionEndExcluding": "1.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:6gk5766-1ge00-3da0:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2C591807-63DE-40DC-8E0A-083080FDC6FC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:6gk5766-1ge00-3db0_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D66877F3-BA23-4FAE-8FFD-7E81332F58B6",
"versionEndExcluding": "1.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:6gk5766-1ge00-3db0:-:*:*:*:*:*:*:*",
"matchCriteriaId": "142E900D-63F3-4CC7-9E27-026B4C38A803",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:6gk5766-1je00-3da0_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "800E0542-02E5-4390-9AF0-82F3DD0B2523",
"versionEndExcluding": "1.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:6gk5766-1je00-3da0:-:*:*:*:*:*:*:*",
"matchCriteriaId": "420D0BD5-A206-4A3F-8978-6D0959CE4F14",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration."
},
{
"lang": "es",
"value": "Se detect\u00f3 un problema en los dispositivos Samsung Galaxy S3 i9305 versi\u00f3n 4.4.4. Las implementaciones de WEP, WPA, WPA2 y WPA3 aceptan segundos fragmentos de transmisi\u00f3n (o posteriores) incluso cuando se env\u00edan en texto plano y los procesan como tramas completas no fragmentados. Un adversario puede abusar de esto para inyectar paquetes de red arbitrarios independientemente de la configuraci\u00f3n de la red"
}
],
"id": "CVE-2020-26145",
"lastModified": "2024-11-21T05:19:21.910",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.5,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-05-11T20:15:08.873",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2021/05/11/12"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://www.fragattacks.com"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2021/05/11/12"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.fragattacks.com"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
var-202105-0257
Vulnerability from variot
An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Moderate: kernel-rt security and bug fix update Advisory ID: RHSA-2021:4140-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2021:4140 Issue date: 2021-11-09 CVE Names: CVE-2020-0427 CVE-2020-24502 CVE-2020-24503 CVE-2020-24504 CVE-2020-24586 CVE-2020-24587 CVE-2020-24588 CVE-2020-26139 CVE-2020-26140 CVE-2020-26141 CVE-2020-26143 CVE-2020-26144 CVE-2020-26145 CVE-2020-26146 CVE-2020-26147 CVE-2020-29368 CVE-2020-29660 CVE-2020-36158 CVE-2020-36386 CVE-2021-0129 CVE-2021-3348 CVE-2021-3489 CVE-2021-3564 CVE-2021-3573 CVE-2021-3600 CVE-2021-3635 CVE-2021-3659 CVE-2021-3679 CVE-2021-3732 CVE-2021-20194 CVE-2021-20239 CVE-2021-23133 CVE-2021-28950 CVE-2021-28971 CVE-2021-29155 CVE-2021-29646 CVE-2021-29650 CVE-2021-31440 CVE-2021-31829 CVE-2021-31916 CVE-2021-33200 ==================================================================== 1. Summary:
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux NFV (v. 8) - x86_64 Red Hat Enterprise Linux RT (v. 8) - x86_64
- Description:
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es): * kernel: out-of-bounds reads in pinctrl subsystem. (CVE-2020-0427) * kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24502) * kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24503) * kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24504) * kernel: Fragmentation cache not cleared on reconnection (CVE-2020-24586) * kernel: Reassembling fragments encrypted under different keys (CVE-2020-24587) * kernel: wifi frame payload being parsed incorrectly as an L2 frame (CVE-2020-24588) * kernel: Forwarding EAPOL from unauthenticated wifi client (CVE-2020-26139) * kernel: accepting plaintext data frames in protected networks (CVE-2020-26140) * kernel: not verifying TKIP MIC of fragmented frames (CVE-2020-26141) * kernel: accepting fragmented plaintext frames in protected networks (CVE-2020-26143) * kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header (CVE-2020-26144) * kernel: accepting plaintext broadcast fragments as full frames (CVE-2020-26145) * kernel: locking inconsistency in tty_io.c and tty_jobctrl.c can lead to a read-after-free (CVE-2020-29660) * kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function via a long SSID value (CVE-2020-36158) * kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() (CVE-2020-36386) * kernel: Improper access control in BlueZ may allow information disclosure vulnerability. (CVE-2021-0129) * kernel: Use-after-free in ndb_queue_rq() (CVE-2021-3348) * kernel: Linux kernel eBPF RINGBUF map oversized allocation (CVE-2021-3489) * kernel: double free in bluetooth subsystem when the HCI device initialization fails (CVE-2021-3564) * kernel: use-after-free in function hci_sock_bound_ioctl() (CVE-2021-3573) * kernel: eBPF 32-bit source register truncation on div/mod (CVE-2021-3600) * kernel: DoS in rb_per_cpu_empty() (CVE-2021-3679) * kernel: overlayfs: Mounting overlayfs inside an unprivileged user namespace can reveal files (CVE-2021-3732) * kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt() (CVE-2021-20194) * kernel: Race condition in sctp_destroy_sock list_del (CVE-2021-23133) * kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode (CVE-2021-28950) * kernel: System crash in intel_pmu_drain_pebs_nhm (CVE-2021-28971) * kernel: protection for sequences of pointer arithmetic operations against speculatively out-of-bounds loads can be bypassed to leak content of kernel memory (CVE-2021-29155) * kernel: improper input validation in tipc_nl_retrieve_key function (CVE-2021-29646) * kernel: lack a full memory barrier upon the assignment of a new table value in x_tables.h may lead to DoS (CVE-2021-29650) * kernel: local escalation of privileges in handling of eBPF programs (CVE-2021-31440) * kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory (CVE-2021-31829) * kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier (CVE-2021-33200) * kernel: reassembling encrypted fragments with non-consecutive packet numbers (CVE-2020-26146) * kernel: reassembling mixed encrypted/plaintext fragments (CVE-2020-26147) * kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check (CVE-2020-29368) * kernel: flowtable list del corruption with kernel BUG (CVE-2021-3635) * kernel: NULL pointer dereference in llsec_key_alloc() (CVE-2021-3659) * kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure (CVE-2021-20239) * kernel: out of bounds array access in drivers/md/dm-ioctl.c (CVE-2021-31916)
- Solution:
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
- Bugs fixed (https://bugzilla.redhat.com/):
1875275 - Failure to enter full_nohz due to needless SCHED softirqs 1902412 - [kernel-rt] BUG: using smp_processor_id() in preemptible [00000000] code: kworker/u129:3/1367837 observed with blktests nvme-tcp tests 1903244 - CVE-2020-29368 kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check 1905747 - kernel-rt-debug: WARNING: possible circular locking dependency detected(&serv->sv_lock -> (softirq_ctrl.lock).lock) 1906522 - CVE-2020-29660 kernel: locking inconsistency in drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c can lead to a read-after-free 1912683 - CVE-2021-20194 kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt() 1913348 - CVE-2020-36158 kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function in drivers/net/wireless/marvell/mwifiex/join.c via a long SSID value 1919893 - CVE-2020-0427 kernel: out-of-bounds reads in pinctrl subsystem. 1921958 - CVE-2021-3348 kernel: Use-after-free in ndb_queue_rq() in drivers/block/nbd.c 1923636 - CVE-2021-20239 kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure 1930376 - CVE-2020-24504 kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers 1930379 - CVE-2020-24502 kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers 1930381 - CVE-2020-24503 kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers 1941762 - CVE-2021-28950 kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode 1941784 - CVE-2021-28971 kernel: System crash in intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c 1945345 - CVE-2021-29646 kernel: improper input validation in tipc_nl_retrieve_key function in net/tipc/node.c 1945388 - CVE-2021-29650 kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS 1946965 - CVE-2021-31916 kernel: out of bounds array access in drivers/md/dm-ioctl.c 1948772 - CVE-2021-23133 kernel: Race condition in sctp_destroy_sock list_del 1951595 - CVE-2021-29155 kernel: protection for sequences of pointer arithmetic operations against speculatively out-of-bounds loads can be bypassed to leak content of kernel memory 1957788 - CVE-2021-31829 kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory 1959559 - CVE-2021-3489 kernel: Linux kernel eBPF RINGBUF map oversized allocation 1959642 - CVE-2020-24586 kernel: Fragmentation cache not cleared on reconnection 1959654 - CVE-2020-24587 kernel: Reassembling fragments encrypted under different keys 1959657 - CVE-2020-24588 kernel: wifi frame payload being parsed incorrectly as an L2 frame 1959663 - CVE-2020-26139 kernel: Forwarding EAPOL from unauthenticated wifi client 1960490 - CVE-2020-26140 kernel: accepting plaintext data frames in protected networks 1960492 - CVE-2020-26141 kernel: not verifying TKIP MIC of fragmented frames 1960496 - CVE-2020-26143 kernel: accepting fragmented plaintext frames in protected networks 1960498 - CVE-2020-26144 kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header 1960500 - CVE-2020-26145 kernel: accepting plaintext broadcast fragments as full frames 1960502 - CVE-2020-26146 kernel: reassembling encrypted fragments with non-consecutive packet numbers 1960504 - CVE-2020-26147 kernel: reassembling mixed encrypted/plaintext fragments 1964028 - CVE-2021-31440 kernel: local escalation of privileges in handling of eBPF programs 1964139 - CVE-2021-3564 kernel: double free in bluetooth subsystem when the HCI device initialization fails 1965038 - CVE-2021-0129 kernel: Improper access control in BlueZ may allow information disclosure vulnerability. 1965458 - CVE-2021-33200 kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier 1966578 - CVE-2021-3573 kernel: use-after-free in function hci_sock_bound_ioctl() 1969489 - CVE-2020-36386 kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() in net/bluetooth/hci_event.c 1975949 - CVE-2021-3659 kernel: NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c 1976946 - CVE-2021-3635 kernel: flowtable list del corruption with kernel BUG at lib/list_debug.c:50 1981954 - CVE-2021-3600 kernel: eBPF 32-bit source register truncation on div/mod 1989165 - CVE-2021-3679 kernel: DoS in rb_per_cpu_empty() 1995249 - CVE-2021-3732 kernel: overlayfs: Mounting overlayfs inside an unprivileged user namespace can reveal files
- Package List:
Red Hat Enterprise Linux NFV (v. 8):
Source: kernel-rt-4.18.0-348.rt7.130.el8.src.rpm
x86_64: kernel-rt-4.18.0-348.rt7.130.el8.x86_64.rpm kernel-rt-core-4.18.0-348.rt7.130.el8.x86_64.rpm kernel-rt-debug-4.18.0-348.rt7.130.el8.x86_64.rpm kernel-rt-debug-core-4.18.0-348.rt7.130.el8.x86_64.rpm kernel-rt-debug-debuginfo-4.18.0-348.rt7.130.el8.x86_64.rpm kernel-rt-debug-devel-4.18.0-348.rt7.130.el8.x86_64.rpm kernel-rt-debug-kvm-4.18.0-348.rt7.130.el8.x86_64.rpm kernel-rt-debug-modules-4.18.0-348.rt7.130.el8.x86_64.rpm kernel-rt-debug-modules-extra-4.18.0-348.rt7.130.el8.x86_64.rpm kernel-rt-debuginfo-4.18.0-348.rt7.130.el8.x86_64.rpm kernel-rt-debuginfo-common-x86_64-4.18.0-348.rt7.130.el8.x86_64.rpm kernel-rt-devel-4.18.0-348.rt7.130.el8.x86_64.rpm kernel-rt-kvm-4.18.0-348.rt7.130.el8.x86_64.rpm kernel-rt-modules-4.18.0-348.rt7.130.el8.x86_64.rpm kernel-rt-modules-extra-4.18.0-348.rt7.130.el8.x86_64.rpm
Red Hat Enterprise Linux RT (v. 8):
Source: kernel-rt-4.18.0-348.rt7.130.el8.src.rpm
x86_64: kernel-rt-4.18.0-348.rt7.130.el8.x86_64.rpm kernel-rt-core-4.18.0-348.rt7.130.el8.x86_64.rpm kernel-rt-debug-4.18.0-348.rt7.130.el8.x86_64.rpm kernel-rt-debug-core-4.18.0-348.rt7.130.el8.x86_64.rpm kernel-rt-debug-debuginfo-4.18.0-348.rt7.130.el8.x86_64.rpm kernel-rt-debug-devel-4.18.0-348.rt7.130.el8.x86_64.rpm kernel-rt-debug-modules-4.18.0-348.rt7.130.el8.x86_64.rpm kernel-rt-debug-modules-extra-4.18.0-348.rt7.130.el8.x86_64.rpm kernel-rt-debuginfo-4.18.0-348.rt7.130.el8.x86_64.rpm kernel-rt-debuginfo-common-x86_64-4.18.0-348.rt7.130.el8.x86_64.rpm kernel-rt-devel-4.18.0-348.rt7.130.el8.x86_64.rpm kernel-rt-modules-4.18.0-348.rt7.130.el8.x86_64.rpm kernel-rt-modules-extra-4.18.0-348.rt7.130.el8.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBYYre49zjgjWX9erEAQhgMQ/7BqqKbZkZDUEDyUeAzIUcDicxQ3b0LM3D jM/Iyk+ZN1YCjlhovu1Y6vI2eYDzW9YLIsaPJUg4ZnliClQckKZM4wVqjb881j6g 2l1Pj+9r99OQsqOHoRMHC0XhwQjGITwG8YWYf8vRlEVsQHFGDz1PBK7rdgt4adMb olziPhDRSdfeTUETLOPzpRyePDv6UghcN841SBYXy1OnWROANm0gVAOTpFtqFgaC RJQJkGGdpaBnRkwyqPUG9NYPwLDkVxjNM/ku6eDfZ9D3zBKdULzxfGNOoMAIXvxS t8mC2quyy0HE6320Wj+q78kRUyvRBJHbNiYRKrmvkDrm2g6lxaB3d4ZN4uMq8wY8 7tMonZGZd8O3pnT2Lpr71pYSb5YC8TceYshMQHU+m40v+ByWQuuOvCXM636/iphr wgv7a6fvku5H/XVQs34u4RldobhDmEdwPd4vQ+IfoSz7uouBwWjD9Fkm1JBeZ3oC 0A/D2rLT+uCTszWqzp9Rz61iMKIqEiLPirgVNnWdYskv0HO+2ePYiXjGdSRqXnIT q1ypdKCqHYHuDdxk468fH0bToxjbjpbVS43Vkhzof44MqS+iGotpRUnOZeWjmKRp 8Fe3BHS4cXWkqrxzMcHMVHP1/7XV82o4RgqDQvnvxo71DOvZxfDwEzyTUHF1LiYZ nbdCAvai1OE=/lv0 -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . ========================================================================== Ubuntu Security Notice USN-4997-2 June 25, 2021
linux-kvm vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 21.04
Summary:
Several security issues were fixed in the Linux kernel.
Software Description: - linux-kvm: Linux kernel for cloud environments
Details:
USN-4997-1 fixed vulnerabilities in the Linux kernel for Ubuntu 21.04. This update provides the corresponding updates for the Linux KVM kernel for Ubuntu 21.04.
Norbert Slusarek discovered a race condition in the CAN BCM networking protocol of the Linux kernel leading to multiple use-after-free vulnerabilities. A local attacker could use this issue to execute arbitrary code. (CVE-2021-3609)
Piotr Krysiuk discovered that the eBPF implementation in the Linux kernel did not properly enforce limits for pointer operations. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-33200)
Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation did not properly clear received fragments from memory in some situations. A physically proximate attacker could possibly use this issue to inject packets or expose sensitive information. (CVE-2020-24586)
Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation incorrectly handled encrypted fragments. A physically proximate attacker could possibly use this issue to decrypt fragments. (CVE-2020-24587)
Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation incorrectly handled certain malformed frames. If a user were tricked into connecting to a malicious server, a physically proximate attacker could use this issue to inject packets. (CVE-2020-24588)
Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation incorrectly handled EAPOL frames from unauthenticated senders. A physically proximate attacker could inject malicious packets to cause a denial of service (system crash). (CVE-2020-26139)
Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation did not properly verify certain fragmented frames. (CVE-2020-26141)
Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation accepted plaintext fragments in certain situations. (CVE-2020-26145)
Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation could reassemble mixed encrypted and plaintext fragments. A physically proximate attacker could possibly use this issue to inject packets or exfiltrate selected fragments. (CVE-2020-26147)
Or Cohen discovered that the SCTP implementation in the Linux kernel contained a race condition in some situations, leading to a use-after-free condition. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-23133)
Or Cohen and Nadav Markus discovered a use-after-free vulnerability in the nfc implementation in the Linux kernel. A privileged local attacker could use this issue to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-23134)
Manfred Paul discovered that the extended Berkeley Packet Filter (eBPF) implementation in the Linux kernel contained an out-of-bounds vulnerability. A local attacker could use this issue to execute arbitrary code. (CVE-2021-31440)
Piotr Krysiuk discovered that the eBPF implementation in the Linux kernel did not properly prevent speculative loads in certain situations. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2021-31829)
It was discovered that a race condition in the kernel Bluetooth subsystem could lead to use-after-free of slab objects. An attacker could use this issue to possibly execute arbitrary code. (CVE-2021-32399)
It was discovered that a use-after-free existed in the Bluetooth HCI driver of the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-33034)
It was discovered that an out-of-bounds (OOB) memory access flaw existed in the f2fs module of the Linux kernel. A local attacker could use this issue to cause a denial of service (system crash). (CVE-2021-3506)
Mathias Krause discovered that a null pointer dereference existed in the Nitro Enclaves kernel driver of the Linux kernel. A local attacker could use this issue to cause a denial of service or possibly execute arbitrary code. (CVE-2021-3543)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 21.04: linux-image-5.11.0-1009-kvm 5.11.0-1009.9 linux-image-kvm 5.11.0.1009.9
After a standard system update you need to reboot your computer to make all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well.
References: https://ubuntu.com/security/notices/USN-4997-2 https://ubuntu.com/security/notices/USN-4997-1 CVE-2020-24586, CVE-2020-24587, CVE-2020-24588, CVE-2020-26139, CVE-2020-26141, CVE-2020-26145, CVE-2020-26147, CVE-2021-23133, CVE-2021-23134, CVE-2021-31440, CVE-2021-31829, CVE-2021-32399, CVE-2021-33034, CVE-2021-33200, CVE-2021-3506, CVE-2021-3543, CVE-2021-3609
Package Information: https://launchpad.net/ubuntu/+source/linux-kvm/5.11.0-1009.9
. Solution:
For OpenShift Container Platform 4.9 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:
https://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html
For Red Hat OpenShift Logging 5.3, see the following instructions to apply this update:
https://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html
- Bugs fixed (https://bugzilla.redhat.com/):
1963232 - CVE-2021-33194 golang: x/net/html: infinite loop in ParseFragment
- JIRA issues fixed (https://issues.jboss.org/):
LOG-1168 - Disable hostname verification in syslog TLS settings
LOG-1235 - Using HTTPS without a secret does not translate into the correct 'scheme' value in Fluentd
LOG-1375 - ssl_ca_cert should be optional
LOG-1378 - CLO should support sasl_plaintext(Password over http)
LOG-1392 - In fluentd config, flush_interval can't be set with flush_mode=immediate
LOG-1494 - Syslog output is serializing json incorrectly
LOG-1555 - Fluentd logs emit transaction failed: error_class=NoMethodError while forwarding to external syslog server
LOG-1575 - Rejected by Elasticsearch and unexpected json-parsing
LOG-1735 - Regression introducing flush_at_shutdown
LOG-1774 - The collector logs should be excluded in fluent.conf
LOG-1776 - fluentd total_limit_size sets value beyond available space
LOG-1822 - OpenShift Alerting Rules Style-Guide Compliance
LOG-1859 - CLO Should not error and exit early on missing ca-bundle when cluster wide proxy is not enabled
LOG-1862 - Unsupported kafka parameters when enabled Kafka SASL
LOG-1903 - Fix the Display of ClusterLogging type in OLM
LOG-1911 - CLF API changes to Opt-in to multiline error detection
LOG-1918 - Alert FluentdNodeDown always firing
LOG-1939 - Opt-in multiline detection breaks cloudwatch forwarding
6
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202105-0257",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "6gk5766-1ge00-3db0",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "1.2"
},
{
"model": "6gk5766-1je00-7da0",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "1.2"
},
{
"model": "6gk5766-1ge00-7ta0",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "1.2"
},
{
"model": "6gk5766-1je00-3da0",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "1.2"
},
{
"model": "6gk5766-1ge00-7da0",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "1.2"
},
{
"model": "6gk5763-1al00-7da0",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "1.2"
},
{
"model": "6gk5763-1al00-3aa0",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "1.2"
},
{
"model": "galaxy i9305",
"scope": "eq",
"trust": 1.0,
"vendor": "samsung",
"version": "4.4.4"
},
{
"model": "6gk5766-1ge00-7db0",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "1.2"
},
{
"model": "6gk5763-1al00-3da0",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "1.2"
},
{
"model": "6gk5766-1je00-7ta0",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "1.2"
},
{
"model": "6gk5766-1ge00-3da0",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "1.2"
},
{
"model": "6gk5766-1ge00-7tb0",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "1.2"
},
{
"model": "nec ai accelerator",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u672c\u96fb\u6c17",
"version": null
},
{
"model": "galaxy s3 i9305",
"scope": null,
"trust": 0.8,
"vendor": "\u30b5\u30e0\u30b9\u30f3",
"version": null
},
{
"model": "aterm",
"scope": "eq",
"trust": 0.8,
"vendor": "\u65e5\u672c\u96fb\u6c17",
"version": null
},
{
"model": "galaxy s3 i9305",
"scope": "eq",
"trust": 0.6,
"vendor": "samsung",
"version": "4.4.4"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-34681"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-006941"
},
{
"db": "NVD",
"id": "CVE-2020-26145"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Ubuntu",
"sources": [
{
"db": "PACKETSTORM",
"id": "166568"
},
{
"db": "PACKETSTORM",
"id": "163249"
},
{
"db": "PACKETSTORM",
"id": "163251"
},
{
"db": "PACKETSTORM",
"id": "163253"
},
{
"db": "PACKETSTORM",
"id": "163255"
},
{
"db": "PACKETSTORM",
"id": "163291"
},
{
"db": "PACKETSTORM",
"id": "163301"
}
],
"trust": 0.7
},
"cve": "CVE-2020-26145",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 6.5,
"id": "CVE-2020-26145",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"severity": "LOW",
"trust": 1.9,
"vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"confidentialityImpact": "NONE",
"exploitabilityScore": 6.5,
"id": "CNVD-2021-34681",
"impactScore": 6.9,
"integrityImpact": "COMPLETE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:A/AC:L/Au:N/C:N/I:C/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "ADJACENT",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"exploitabilityScore": 2.8,
"id": "CVE-2020-26145",
"impactScore": 3.6,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Adjacent Network",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 6.5,
"baseSeverity": "Medium",
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2020-26145",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2020-26145",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2020-26145",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNVD",
"id": "CNVD-2021-34681",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-202105-631",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULMON",
"id": "CVE-2020-26145",
"trust": 0.1,
"value": "LOW"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-34681"
},
{
"db": "VULMON",
"id": "CVE-2020-26145"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-006941"
},
{
"db": "CNNVD",
"id": "CNNVD-202105-631"
},
{
"db": "NVD",
"id": "CVE-2020-26145"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n==================================================================== \nRed Hat Security Advisory\n\nSynopsis: Moderate: kernel-rt security and bug fix update\nAdvisory ID: RHSA-2021:4140-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://access.redhat.com/errata/RHSA-2021:4140\nIssue date: 2021-11-09\nCVE Names: CVE-2020-0427 CVE-2020-24502 CVE-2020-24503\n CVE-2020-24504 CVE-2020-24586 CVE-2020-24587\n CVE-2020-24588 CVE-2020-26139 CVE-2020-26140\n CVE-2020-26141 CVE-2020-26143 CVE-2020-26144\n CVE-2020-26145 CVE-2020-26146 CVE-2020-26147\n CVE-2020-29368 CVE-2020-29660 CVE-2020-36158\n CVE-2020-36386 CVE-2021-0129 CVE-2021-3348\n CVE-2021-3489 CVE-2021-3564 CVE-2021-3573\n CVE-2021-3600 CVE-2021-3635 CVE-2021-3659\n CVE-2021-3679 CVE-2021-3732 CVE-2021-20194\n CVE-2021-20239 CVE-2021-23133 CVE-2021-28950\n CVE-2021-28971 CVE-2021-29155 CVE-2021-29646\n CVE-2021-29650 CVE-2021-31440 CVE-2021-31829\n CVE-2021-31916 CVE-2021-33200\n====================================================================\n1. Summary:\n\nAn update for kernel-rt is now available for Red Hat Enterprise Linux 8. \n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux NFV (v. 8) - x86_64\nRed Hat Enterprise Linux RT (v. 8) - x86_64\n\n3. Description:\n\nThe kernel-rt packages provide the Real Time Linux Kernel, which enables\nfine-tuning for systems with extremely high determinism requirements. \n\nSecurity Fix(es):\n* kernel: out-of-bounds reads in pinctrl subsystem. (CVE-2020-0427)\n* kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter\ndrivers (CVE-2020-24502)\n* kernel: Insufficient access control in some Intel(R) Ethernet E810\nAdapter drivers (CVE-2020-24503)\n* kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810\nAdapter drivers (CVE-2020-24504)\n* kernel: Fragmentation cache not cleared on reconnection (CVE-2020-24586)\n* kernel: Reassembling fragments encrypted under different keys\n(CVE-2020-24587)\n* kernel: wifi frame payload being parsed incorrectly as an L2 frame\n(CVE-2020-24588)\n* kernel: Forwarding EAPOL from unauthenticated wifi client\n(CVE-2020-26139)\n* kernel: accepting plaintext data frames in protected networks\n(CVE-2020-26140)\n* kernel: not verifying TKIP MIC of fragmented frames (CVE-2020-26141)\n* kernel: accepting fragmented plaintext frames in protected networks\n(CVE-2020-26143)\n* kernel: accepting unencrypted A-MSDU frames that start with RFC1042\nheader (CVE-2020-26144)\n* kernel: accepting plaintext broadcast fragments as full frames\n(CVE-2020-26145)\n* kernel: locking inconsistency in tty_io.c and tty_jobctrl.c can lead to a\nread-after-free (CVE-2020-29660)\n* kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function via a\nlong SSID value (CVE-2020-36158)\n* kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt()\n(CVE-2020-36386)\n* kernel: Improper access control in BlueZ may allow information disclosure\nvulnerability. (CVE-2021-0129)\n* kernel: Use-after-free in ndb_queue_rq() (CVE-2021-3348)\n* kernel: Linux kernel eBPF RINGBUF map oversized allocation\n(CVE-2021-3489)\n* kernel: double free in bluetooth subsystem when the HCI device\ninitialization fails (CVE-2021-3564)\n* kernel: use-after-free in function hci_sock_bound_ioctl() (CVE-2021-3573)\n* kernel: eBPF 32-bit source register truncation on div/mod (CVE-2021-3600)\n* kernel: DoS in rb_per_cpu_empty() (CVE-2021-3679)\n* kernel: overlayfs: Mounting overlayfs inside an unprivileged user\nnamespace can reveal files (CVE-2021-3732)\n* kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt()\n(CVE-2021-20194)\n* kernel: Race condition in sctp_destroy_sock list_del (CVE-2021-23133)\n* kernel: fuse: stall on CPU can occur because a retry loop continually\nfinds the same bad inode (CVE-2021-28950)\n* kernel: System crash in intel_pmu_drain_pebs_nhm (CVE-2021-28971)\n* kernel: protection for sequences of pointer arithmetic operations against\nspeculatively out-of-bounds loads can be bypassed to leak content of kernel\nmemory (CVE-2021-29155)\n* kernel: improper input validation in tipc_nl_retrieve_key function\n(CVE-2021-29646)\n* kernel: lack a full memory barrier upon the assignment of a new table\nvalue in x_tables.h may lead to DoS (CVE-2021-29650)\n* kernel: local escalation of privileges in handling of eBPF programs\n(CVE-2021-31440)\n* kernel: protection of stack pointer against speculative pointer\narithmetic can be bypassed to leak content of kernel memory\n(CVE-2021-31829)\n* kernel: out-of-bounds reads and writes due to enforcing incorrect limits\nfor pointer arithmetic operations by BPF verifier (CVE-2021-33200)\n* kernel: reassembling encrypted fragments with non-consecutive packet\nnumbers (CVE-2020-26146)\n* kernel: reassembling mixed encrypted/plaintext fragments (CVE-2020-26147)\n* kernel: the copy-on-write implementation can grant unintended write\naccess because of a race condition in a THP mapcount check (CVE-2020-29368)\n* kernel: flowtable list del corruption with kernel BUG (CVE-2021-3635)\n* kernel: NULL pointer dereference in llsec_key_alloc() (CVE-2021-3659)\n* kernel: setsockopt System Call Untrusted Pointer Dereference Information\nDisclosure (CVE-2021-20239)\n* kernel: out of bounds array access in drivers/md/dm-ioctl.c\n(CVE-2021-31916)\n\n4. Solution:\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. \n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat\nEnterprise Linux 8.5 Release Notes linked from the References section. \n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect. \n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1875275 - Failure to enter full_nohz due to needless SCHED softirqs\n1902412 - [kernel-rt] BUG: using smp_processor_id() in preemptible [00000000] code: kworker/u129:3/1367837 observed with blktests nvme-tcp tests\n1903244 - CVE-2020-29368 kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check\n1905747 - kernel-rt-debug: WARNING: possible circular locking dependency detected(\u0026serv-\u003esv_lock -\u003e (softirq_ctrl.lock).lock)\n1906522 - CVE-2020-29660 kernel: locking inconsistency in drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c can lead to a read-after-free\n1912683 - CVE-2021-20194 kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt()\n1913348 - CVE-2020-36158 kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function in drivers/net/wireless/marvell/mwifiex/join.c via a long SSID value\n1919893 - CVE-2020-0427 kernel: out-of-bounds reads in pinctrl subsystem. \n1921958 - CVE-2021-3348 kernel: Use-after-free in ndb_queue_rq() in drivers/block/nbd.c\n1923636 - CVE-2021-20239 kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure\n1930376 - CVE-2020-24504 kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers\n1930379 - CVE-2020-24502 kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers\n1930381 - CVE-2020-24503 kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers\n1941762 - CVE-2021-28950 kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode\n1941784 - CVE-2021-28971 kernel: System crash in intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c\n1945345 - CVE-2021-29646 kernel: improper input validation in tipc_nl_retrieve_key function in net/tipc/node.c\n1945388 - CVE-2021-29650 kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS\n1946965 - CVE-2021-31916 kernel: out of bounds array access in drivers/md/dm-ioctl.c\n1948772 - CVE-2021-23133 kernel: Race condition in sctp_destroy_sock list_del\n1951595 - CVE-2021-29155 kernel: protection for sequences of pointer arithmetic operations against speculatively out-of-bounds loads can be bypassed to leak content of kernel memory\n1957788 - CVE-2021-31829 kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory\n1959559 - CVE-2021-3489 kernel: Linux kernel eBPF RINGBUF map oversized allocation\n1959642 - CVE-2020-24586 kernel: Fragmentation cache not cleared on reconnection\n1959654 - CVE-2020-24587 kernel: Reassembling fragments encrypted under different keys\n1959657 - CVE-2020-24588 kernel: wifi frame payload being parsed incorrectly as an L2 frame\n1959663 - CVE-2020-26139 kernel: Forwarding EAPOL from unauthenticated wifi client\n1960490 - CVE-2020-26140 kernel: accepting plaintext data frames in protected networks\n1960492 - CVE-2020-26141 kernel: not verifying TKIP MIC of fragmented frames\n1960496 - CVE-2020-26143 kernel: accepting fragmented plaintext frames in protected networks\n1960498 - CVE-2020-26144 kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header\n1960500 - CVE-2020-26145 kernel: accepting plaintext broadcast fragments as full frames\n1960502 - CVE-2020-26146 kernel: reassembling encrypted fragments with non-consecutive packet numbers\n1960504 - CVE-2020-26147 kernel: reassembling mixed encrypted/plaintext fragments\n1964028 - CVE-2021-31440 kernel: local escalation of privileges in handling of eBPF programs\n1964139 - CVE-2021-3564 kernel: double free in bluetooth subsystem when the HCI device initialization fails\n1965038 - CVE-2021-0129 kernel: Improper access control in BlueZ may allow information disclosure vulnerability. \n1965458 - CVE-2021-33200 kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier\n1966578 - CVE-2021-3573 kernel: use-after-free in function hci_sock_bound_ioctl()\n1969489 - CVE-2020-36386 kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() in net/bluetooth/hci_event.c\n1975949 - CVE-2021-3659 kernel: NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c\n1976946 - CVE-2021-3635 kernel: flowtable list del corruption with kernel BUG at lib/list_debug.c:50\n1981954 - CVE-2021-3600 kernel: eBPF 32-bit source register truncation on div/mod\n1989165 - CVE-2021-3679 kernel: DoS in rb_per_cpu_empty()\n1995249 - CVE-2021-3732 kernel: overlayfs: Mounting overlayfs inside an unprivileged user namespace can reveal files\n\n6. Package List:\n\nRed Hat Enterprise Linux NFV (v. 8):\n\nSource:\nkernel-rt-4.18.0-348.rt7.130.el8.src.rpm\n\nx86_64:\nkernel-rt-4.18.0-348.rt7.130.el8.x86_64.rpm\nkernel-rt-core-4.18.0-348.rt7.130.el8.x86_64.rpm\nkernel-rt-debug-4.18.0-348.rt7.130.el8.x86_64.rpm\nkernel-rt-debug-core-4.18.0-348.rt7.130.el8.x86_64.rpm\nkernel-rt-debug-debuginfo-4.18.0-348.rt7.130.el8.x86_64.rpm\nkernel-rt-debug-devel-4.18.0-348.rt7.130.el8.x86_64.rpm\nkernel-rt-debug-kvm-4.18.0-348.rt7.130.el8.x86_64.rpm\nkernel-rt-debug-modules-4.18.0-348.rt7.130.el8.x86_64.rpm\nkernel-rt-debug-modules-extra-4.18.0-348.rt7.130.el8.x86_64.rpm\nkernel-rt-debuginfo-4.18.0-348.rt7.130.el8.x86_64.rpm\nkernel-rt-debuginfo-common-x86_64-4.18.0-348.rt7.130.el8.x86_64.rpm\nkernel-rt-devel-4.18.0-348.rt7.130.el8.x86_64.rpm\nkernel-rt-kvm-4.18.0-348.rt7.130.el8.x86_64.rpm\nkernel-rt-modules-4.18.0-348.rt7.130.el8.x86_64.rpm\nkernel-rt-modules-extra-4.18.0-348.rt7.130.el8.x86_64.rpm\n\nRed Hat Enterprise Linux RT (v. 8):\n\nSource:\nkernel-rt-4.18.0-348.rt7.130.el8.src.rpm\n\nx86_64:\nkernel-rt-4.18.0-348.rt7.130.el8.x86_64.rpm\nkernel-rt-core-4.18.0-348.rt7.130.el8.x86_64.rpm\nkernel-rt-debug-4.18.0-348.rt7.130.el8.x86_64.rpm\nkernel-rt-debug-core-4.18.0-348.rt7.130.el8.x86_64.rpm\nkernel-rt-debug-debuginfo-4.18.0-348.rt7.130.el8.x86_64.rpm\nkernel-rt-debug-devel-4.18.0-348.rt7.130.el8.x86_64.rpm\nkernel-rt-debug-modules-4.18.0-348.rt7.130.el8.x86_64.rpm\nkernel-rt-debug-modules-extra-4.18.0-348.rt7.130.el8.x86_64.rpm\nkernel-rt-debuginfo-4.18.0-348.rt7.130.el8.x86_64.rpm\nkernel-rt-debuginfo-common-x86_64-4.18.0-348.rt7.130.el8.x86_64.rpm\nkernel-rt-devel-4.18.0-348.rt7.130.el8.x86_64.rpm\nkernel-rt-modules-4.18.0-348.rt7.130.el8.x86_64.rpm\nkernel-rt-modules-extra-4.18.0-348.rt7.130.el8.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2021 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\nnbdCAvai1OE=/lv0\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://listman.redhat.com/mailman/listinfo/rhsa-announce\n. ==========================================================================\nUbuntu Security Notice USN-4997-2\nJune 25, 2021\n\nlinux-kvm vulnerabilities\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 21.04\n\nSummary:\n\nSeveral security issues were fixed in the Linux kernel. \n\nSoftware Description:\n- linux-kvm: Linux kernel for cloud environments\n\nDetails:\n\nUSN-4997-1 fixed vulnerabilities in the Linux kernel for Ubuntu 21.04. \nThis update provides the corresponding updates for the Linux KVM\nkernel for Ubuntu 21.04. \n\nNorbert Slusarek discovered a race condition in the CAN BCM networking\nprotocol of the Linux kernel leading to multiple use-after-free\nvulnerabilities. A local attacker could use this issue to execute arbitrary\ncode. (CVE-2021-3609)\n\nPiotr Krysiuk discovered that the eBPF implementation in the Linux kernel\ndid not properly enforce limits for pointer operations. A local attacker\ncould use this to cause a denial of service (system crash) or possibly\nexecute arbitrary code. (CVE-2021-33200)\n\nMathy Vanhoef discovered that the Linux kernel\u2019s WiFi implementation did\nnot properly clear received fragments from memory in some situations. A\nphysically proximate attacker could possibly use this issue to inject\npackets or expose sensitive information. (CVE-2020-24586)\n\nMathy Vanhoef discovered that the Linux kernel\u2019s WiFi implementation\nincorrectly handled encrypted fragments. A physically proximate attacker\ncould possibly use this issue to decrypt fragments. (CVE-2020-24587)\n\nMathy Vanhoef discovered that the Linux kernel\u2019s WiFi implementation\nincorrectly handled certain malformed frames. If a user were tricked into\nconnecting to a malicious server, a physically proximate attacker could use\nthis issue to inject packets. (CVE-2020-24588)\n\nMathy Vanhoef discovered that the Linux kernel\u2019s WiFi implementation\nincorrectly handled EAPOL frames from unauthenticated senders. A physically\nproximate attacker could inject malicious packets to cause a denial of\nservice (system crash). (CVE-2020-26139)\n\nMathy Vanhoef discovered that the Linux kernel\u2019s WiFi implementation did\nnot properly verify certain fragmented frames. \n(CVE-2020-26141)\n\nMathy Vanhoef discovered that the Linux kernel\u2019s WiFi implementation\naccepted plaintext fragments in certain situations. (CVE-2020-26145)\n\nMathy Vanhoef discovered that the Linux kernel\u2019s WiFi implementation could\nreassemble mixed encrypted and plaintext fragments. A physically proximate\nattacker could possibly use this issue to inject packets or exfiltrate\nselected fragments. (CVE-2020-26147)\n\nOr Cohen discovered that the SCTP implementation in the Linux kernel\ncontained a race condition in some situations, leading to a use-after-free\ncondition. A local attacker could use this to cause a denial of service\n(system crash) or possibly execute arbitrary code. (CVE-2021-23133)\n\nOr Cohen and Nadav Markus discovered a use-after-free vulnerability in the\nnfc implementation in the Linux kernel. A privileged local attacker could\nuse this issue to cause a denial of service (system crash) or possibly\nexecute arbitrary code. (CVE-2021-23134)\n\nManfred Paul discovered that the extended Berkeley Packet Filter (eBPF)\nimplementation in the Linux kernel contained an out-of-bounds\nvulnerability. A local attacker could use this issue to execute arbitrary\ncode. (CVE-2021-31440)\n\nPiotr Krysiuk discovered that the eBPF implementation in the Linux kernel\ndid not properly prevent speculative loads in certain situations. A local\nattacker could use this to expose sensitive information (kernel memory). \n(CVE-2021-31829)\n\nIt was discovered that a race condition in the kernel Bluetooth subsystem\ncould lead to use-after-free of slab objects. An attacker could use this\nissue to possibly execute arbitrary code. (CVE-2021-32399)\n\nIt was discovered that a use-after-free existed in the Bluetooth HCI driver\nof the Linux kernel. A local attacker could use this to cause a denial of\nservice (system crash) or possibly execute arbitrary code. (CVE-2021-33034)\n\nIt was discovered that an out-of-bounds (OOB) memory access flaw existed in\nthe f2fs module of the Linux kernel. A local attacker could use this issue\nto cause a denial of service (system crash). (CVE-2021-3506)\n\nMathias Krause discovered that a null pointer dereference existed in the\nNitro Enclaves kernel driver of the Linux kernel. A local attacker could\nuse this issue to cause a denial of service or possibly execute arbitrary\ncode. (CVE-2021-3543)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 21.04:\n linux-image-5.11.0-1009-kvm 5.11.0-1009.9\n linux-image-kvm 5.11.0.1009.9\n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes. \n\nATTENTION: Due to an unavoidable ABI change the kernel updates have\nbeen given a new version number, which requires you to recompile and\nreinstall all third party kernel modules you might have installed. \nUnless you manually uninstalled the standard kernel metapackages\n(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,\nlinux-powerpc), a standard system upgrade will automatically perform\nthis as well. \n\nReferences:\n https://ubuntu.com/security/notices/USN-4997-2\n https://ubuntu.com/security/notices/USN-4997-1\n CVE-2020-24586, CVE-2020-24587, CVE-2020-24588, CVE-2020-26139,\n CVE-2020-26141, CVE-2020-26145, CVE-2020-26147, CVE-2021-23133,\n CVE-2021-23134, CVE-2021-31440, CVE-2021-31829, CVE-2021-32399,\n CVE-2021-33034, CVE-2021-33200, CVE-2021-3506, CVE-2021-3543,\n CVE-2021-3609\n\nPackage Information:\n https://launchpad.net/ubuntu/+source/linux-kvm/5.11.0-1009.9\n\n. Solution:\n\nFor OpenShift Container Platform 4.9 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html\n\nFor Red Hat OpenShift Logging 5.3, see the following instructions to apply\nthis update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html\n\n4. Bugs fixed (https://bugzilla.redhat.com/):\n\n1963232 - CVE-2021-33194 golang: x/net/html: infinite loop in ParseFragment\n\n5. JIRA issues fixed (https://issues.jboss.org/):\n\nLOG-1168 - Disable hostname verification in syslog TLS settings\nLOG-1235 - Using HTTPS without a secret does not translate into the correct \u0027scheme\u0027 value in Fluentd\nLOG-1375 - ssl_ca_cert should be optional\nLOG-1378 - CLO should support sasl_plaintext(Password over http)\nLOG-1392 - In fluentd config, flush_interval can\u0027t be set with flush_mode=immediate\nLOG-1494 - Syslog output is serializing json incorrectly\nLOG-1555 - Fluentd logs emit transaction failed: error_class=NoMethodError while forwarding to external syslog server\nLOG-1575 - Rejected by Elasticsearch and unexpected json-parsing\nLOG-1735 - Regression introducing flush_at_shutdown \nLOG-1774 - The collector logs should be excluded in fluent.conf\nLOG-1776 - fluentd total_limit_size sets value beyond available space\nLOG-1822 - OpenShift Alerting Rules Style-Guide Compliance\nLOG-1859 - CLO Should not error and exit early on missing ca-bundle when cluster wide proxy is not enabled\nLOG-1862 - Unsupported kafka parameters when enabled Kafka SASL\nLOG-1903 - Fix the Display of ClusterLogging type in OLM\nLOG-1911 - CLF API changes to Opt-in to multiline error detection\nLOG-1918 - Alert `FluentdNodeDown` always firing \nLOG-1939 - Opt-in multiline detection breaks cloudwatch forwarding\n\n6",
"sources": [
{
"db": "NVD",
"id": "CVE-2020-26145"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-006941"
},
{
"db": "CNVD",
"id": "CNVD-2021-34681"
},
{
"db": "VULMON",
"id": "CVE-2020-26145"
},
{
"db": "PACKETSTORM",
"id": "164875"
},
{
"db": "PACKETSTORM",
"id": "166568"
},
{
"db": "PACKETSTORM",
"id": "163249"
},
{
"db": "PACKETSTORM",
"id": "163251"
},
{
"db": "PACKETSTORM",
"id": "163253"
},
{
"db": "PACKETSTORM",
"id": "163255"
},
{
"db": "PACKETSTORM",
"id": "163291"
},
{
"db": "PACKETSTORM",
"id": "163301"
},
{
"db": "PACKETSTORM",
"id": "164967"
}
],
"trust": 3.06
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2020-26145",
"trust": 4.8
},
{
"db": "OPENWALL",
"id": "OSS-SECURITY/2021/05/11/12",
"trust": 2.5
},
{
"db": "SIEMENS",
"id": "SSA-913875",
"trust": 1.7
},
{
"db": "JVN",
"id": "JVNVU93485736",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2021-006941",
"trust": 0.8
},
{
"db": "ICS CERT",
"id": "ICSA-22-104-04",
"trust": 0.7
},
{
"db": "PACKETSTORM",
"id": "164875",
"trust": 0.7
},
{
"db": "PACKETSTORM",
"id": "166568",
"trust": 0.7
},
{
"db": "PACKETSTORM",
"id": "163249",
"trust": 0.7
},
{
"db": "PACKETSTORM",
"id": "163291",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2021-34681",
"trust": 0.6
},
{
"db": "CS-HELP",
"id": "SB2021100407",
"trust": 0.6
},
{
"db": "CS-HELP",
"id": "SB2021051814",
"trust": 0.6
},
{
"db": "CS-HELP",
"id": "SB2021051212",
"trust": 0.6
},
{
"db": "CS-HELP",
"id": "SB2021051915",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2021.2216",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2021.3905",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2021.2079",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2021.2136",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2021.1628",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2022.1408",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2021.4254",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2021.2249",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2021.2290",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2022.1715",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2021.2511",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2021.2876",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2021.3825",
"trust": 0.6
},
{
"db": "ICS CERT",
"id": "ICSA-21-236-01",
"trust": 0.6
},
{
"db": "LENOVO",
"id": "LEN-61212",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202105-631",
"trust": 0.6
},
{
"db": "VULMON",
"id": "CVE-2020-26145",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "163251",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "163253",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "163255",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "163301",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "164967",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-34681"
},
{
"db": "VULMON",
"id": "CVE-2020-26145"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-006941"
},
{
"db": "PACKETSTORM",
"id": "164875"
},
{
"db": "PACKETSTORM",
"id": "166568"
},
{
"db": "PACKETSTORM",
"id": "163249"
},
{
"db": "PACKETSTORM",
"id": "163251"
},
{
"db": "PACKETSTORM",
"id": "163253"
},
{
"db": "PACKETSTORM",
"id": "163255"
},
{
"db": "PACKETSTORM",
"id": "163291"
},
{
"db": "PACKETSTORM",
"id": "163301"
},
{
"db": "PACKETSTORM",
"id": "164967"
},
{
"db": "CNNVD",
"id": "CNNVD-202105-631"
},
{
"db": "NVD",
"id": "CVE-2020-26145"
}
]
},
"id": "VAR-202105-0257",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-34681"
}
],
"trust": 1.03387681
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"IoT"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-34681"
}
]
},
"last_update_date": "2024-11-29T21:40:04.933000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Welcome\u00a0to\u00a0Samsung\u00a0Mobile\u00a0Security NEC NEC Product security information",
"trust": 0.8,
"url": "https://security.samsungmobile.com/main.smsb"
},
{
"title": "Patch for Samsung Galaxy S3 input validation error vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/264941"
},
{
"title": "Samsung Galaxy S3 Enter the fix for the verification error vulnerability",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=150564"
},
{
"title": "Red Hat: CVE-2020-26145",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=CVE-2020-26145"
},
{
"title": "Arch Linux Issues: ",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues\u0026qid=CVE-2020-26145 log"
},
{
"title": "Ubuntu Security Notice: USN-5361-1: Linux kernel vulnerabilities",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-5361-1"
},
{
"title": "Amazon Linux 2: ALAS2KERNEL-5.4-2022-004",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=ALAS2KERNEL-5.4-2022-004"
},
{
"title": "Cisco: Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts\u0026qid=cisco-sa-wifi-faf-22epcEWu"
},
{
"title": "Amazon Linux 2: ALAS2KERNEL-5.10-2022-002",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=ALAS2KERNEL-5.10-2022-002"
},
{
"title": "",
"trust": 0.1,
"url": "https://github.com/kali973/fragAttacks "
},
{
"title": "fragattacks",
"trust": 0.1,
"url": "https://github.com/vanhoefm/fragattacks "
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-34681"
},
{
"db": "VULMON",
"id": "CVE-2020-26145"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-006941"
},
{
"db": "CNNVD",
"id": "CNNVD-202105-631"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-20",
"trust": 1.0
},
{
"problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2021-006941"
},
{
"db": "NVD",
"id": "CVE-2020-26145"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.5,
"url": "http://www.openwall.com/lists/oss-security/2021/05/11/12"
},
{
"trust": 2.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-26145"
},
{
"trust": 1.7,
"url": "https://www.fragattacks.com"
},
{
"trust": 1.7,
"url": "https://github.com/vanhoefm/fragattacks/blob/master/summary.md"
},
{
"trust": 1.7,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu93485736/"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-26141"
},
{
"trust": 0.7,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-26147"
},
{
"trust": 0.7,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-24588"
},
{
"trust": 0.7,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-24586"
},
{
"trust": 0.7,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-23133"
},
{
"trust": 0.7,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-24587"
},
{
"trust": 0.7,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-26139"
},
{
"trust": 0.6,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-3609"
},
{
"trust": 0.6,
"url": "https://www.qualcomm.com/company/product-security/bulletins/august-2021-bulletin"
},
{
"trust": 0.6,
"url": "https://support.lenovo.com/us/en/product_security/len-61212"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2021.2216"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2021.2876"
},
{
"trust": 0.6,
"url": "https://source.android.com/security/bulletin/2021-10-01"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2021.3905"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2021.1628"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2021.3825"
},
{
"trust": 0.6,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-104-04"
},
{
"trust": 0.6,
"url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-wifi-faf-22epcewu"
},
{
"trust": 0.6,
"url": "https://www.cybersecurity-help.cz/vdb/sb2021100407"
},
{
"trust": 0.6,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-236-01"
},
{
"trust": 0.6,
"url": "https://www.cybersecurity-help.cz/vdb/sb2021051814"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2022.1408"
},
{
"trust": 0.6,
"url": "https://vigilance.fr/vulnerability/wi-fi-devices-multiple-vulnerabilities-via-fragattacks-35386"
},
{
"trust": 0.6,
"url": "https://www.cybersecurity-help.cz/vdb/sb2021051915"
},
{
"trust": 0.6,
"url": "https://www.cybersecurity-help.cz/vdb/sb2021051212"
},
{
"trust": 0.6,
"url": "https://packetstormsecurity.com/files/163291/ubuntu-security-notice-usn-5000-2.html"
},
{
"trust": 0.6,
"url": "https://packetstormsecurity.com/files/164875/red-hat-security-advisory-2021-4140-02.html"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2021.2249"
},
{
"trust": 0.6,
"url": "https://packetstormsecurity.com/files/163249/ubuntu-security-notice-usn-4997-1.html"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2021.2511"
},
{
"trust": 0.6,
"url": "https://packetstormsecurity.com/files/166568/ubuntu-security-notice-usn-5361-1.html"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2021.2136"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2021.4254"
},
{
"trust": 0.6,
"url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202111-0000001218088197"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2021.2079"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2021.2290"
},
{
"trust": 0.6,
"url": "https://www.huawei.com/cn/psirt/security-notices/huawei-sn-20210513-01-fragattacks-cn"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2022.1715"
},
{
"trust": 0.5,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-33200"
},
{
"trust": 0.5,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-32399"
},
{
"trust": 0.5,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-3506"
},
{
"trust": 0.5,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-23134"
},
{
"trust": 0.5,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-33034"
},
{
"trust": 0.5,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-31829"
},
{
"trust": 0.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-31440"
},
{
"trust": 0.3,
"url": "https://access.redhat.com/security/cve/cve-2020-26145"
},
{
"trust": 0.3,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-3543"
},
{
"trust": 0.2,
"url": "https://ubuntu.com/security/notices/usn-5361-1"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2020-26143"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2020-24504"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2021-3600"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2021-20239"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2020-26144"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2021-3679"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2020-36158"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2021-3635"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2021-31829"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2020-36386"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2021-33200"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2021-29650"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-0427"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2021-3573"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2020-29368"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2021-20194"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2020-24586"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2020-26147"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2021-31916"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2020-26141"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2021-3348"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2021-28950"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2020-24588"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2020-26140"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2021-31440"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2020-26146"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2021-29646"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-29155"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2021-29155"
},
{
"trust": 0.2,
"url": "https://listman.redhat.com/mailman/listinfo/rhsa-announce"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2021-3732"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2021-0129"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2021-3489"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-24503"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/team/contact/"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2020-29660"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2020-24587"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2020-26139"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2021-28971"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2020-24502"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2020-24503"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2021-3659"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2021-3564"
},
{
"trust": 0.2,
"url": "https://bugzilla.redhat.com/):"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2020-0427"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2021-23133"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-24502"
},
{
"trust": 0.2,
"url": "https://ubuntu.com/security/notices/usn-4997-1"
},
{
"trust": 0.2,
"url": "https://ubuntu.com/security/notices/usn-5000-1"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/20.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-104-04"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/articles/11258"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-26144"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-24504"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-20239"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-20194"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-0129"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-28950"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-26143"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-29368"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2021:4140"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/team/key/"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-26140"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-36386"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-29660"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-28971"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-36158"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-26146"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-42739"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-0920"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-28964"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-37159"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-4083"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-0935"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-45486"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-3702"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-12888"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-31916"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-39636"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-43976"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/linux-oracle/5.11.0-1010.10"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/linux-aws/5.11.0-1011.11"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/linux-raspi/5.11.0-1012.13"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/linux-gcp/5.11.0-1011.12"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/linux-azure/5.11.0-1009.9"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/linux/5.11.0-22.23"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/linux-oracle-5.8/5.8.0-1033.34~20.04.1"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/linux-azure-5.8/5.8.0-1036.38~20.04.1"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-25670"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/linux-raspi/5.8.0-1029.32"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/linux-gcp/5.8.0-1035.37"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/linux/5.8.0-59.66"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-25671"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/linux-aws/5.8.0-1038.40"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/linux-azure/5.8.0-1036.38"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-25673"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/linux-hwe-5.8/5.8.0-59.66~20.04.1"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/linux-kvm/5.8.0-1030.32"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/linux-gcp-5.8/5.8.0-1035.37~20.04.1"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/linux-aws-5.8/5.8.0-1038.40~20.04.1"
},
{
"trust": 0.1,
"url": "https://ubuntu.com/security/notices/usn-4999-1"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/linux-oracle/5.8.0-1033.34"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/linux-gcp/5.4.0-1046.49"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/linux-oracle/5.4.0-1048.52"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/linux-aws-5.4/5.4.0-1051.53~18.04.1"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/linux-azure/5.4.0-1051.53"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/linux-gkeop/5.4.0-1018.19"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/linux-raspi/5.4.0-1038.41"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/linux-gke-5.4/5.4.0-1046.48~18.04.1"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/linux-gkeop-5.4/5.4.0-1018.19~18.04.1"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/linux-hwe-5.4/5.4.0-77.86~18.04.1"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/linux-raspi-5.4/5.4.0-1038.41~18.04.1"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/linux/5.4.0-77.86"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/linux-aws/5.4.0-1051.53"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/linux-gcp-5.4/5.4.0-1046.49~18.04.1"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/linux-azure-5.4/5.4.0-1051.53~18.04.1"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/linux-oracle-5.4/5.4.0-1048.52~18.04.1"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/linux-gke/5.4.0-1046.48"
},
{
"trust": 0.1,
"url": "https://ubuntu.com/security/notices/usn-5001-1"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/linux-oem-5.10/5.10.0-1033.34"
},
{
"trust": 0.1,
"url": "https://ubuntu.com/security/notices/usn-5000-2"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/linux-kvm/5.4.0-1041.42"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/linux-kvm/5.11.0-1009.9"
},
{
"trust": 0.1,
"url": "https://ubuntu.com/security/notices/usn-4997-2"
},
{
"trust": 0.1,
"url": "https://issues.jboss.org/):"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-14155"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-24370"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-35521"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2018-25014"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-13435"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-35522"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-12762"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2019-20838"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-27777"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-3426"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2019-14615"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-17594"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2019-17594"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-23841"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-17541"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-5827"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-3800"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-33574"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-42574"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-19603"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-36332"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-24370"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-3572"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-14145"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-3445"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-25009"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2018-25012"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-36331"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-3200"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-33033"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-25010"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-20197"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-3487"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-22876"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-16135"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-36312"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-13750"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-23840"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2019-17595"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-10001"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2018-25009"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-10001"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-36085"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-35448"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2019-19603"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-20673"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2019-13750"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-17541"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2018-20673"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-20231"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2018-25013"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-3580"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-14155"
},
{
"trust": 0.1,
"url": "https://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-35524"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-16135"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-13751"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-17595"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-20266"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-27645"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-33194"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-25013"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-22925"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-22898"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-36087"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2019-13751"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-36330"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-20838"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-3778"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-20284"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-31535"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-35942"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-12762"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-25014"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-14615"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-3481"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-13435"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-36086"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-14145"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-35523"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-28153"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-20232"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-33560"
},
{
"trust": 0.1,
"url": "https://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-3796"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2018-25010"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2019-18218"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2019-5827"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-36084"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-18218"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2021:4627"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-25012"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-34681"
},
{
"db": "VULMON",
"id": "CVE-2020-26145"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-006941"
},
{
"db": "PACKETSTORM",
"id": "164875"
},
{
"db": "PACKETSTORM",
"id": "166568"
},
{
"db": "PACKETSTORM",
"id": "163249"
},
{
"db": "PACKETSTORM",
"id": "163251"
},
{
"db": "PACKETSTORM",
"id": "163253"
},
{
"db": "PACKETSTORM",
"id": "163255"
},
{
"db": "PACKETSTORM",
"id": "163291"
},
{
"db": "PACKETSTORM",
"id": "163301"
},
{
"db": "PACKETSTORM",
"id": "164967"
},
{
"db": "CNNVD",
"id": "CNNVD-202105-631"
},
{
"db": "NVD",
"id": "CVE-2020-26145"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2021-34681"
},
{
"db": "VULMON",
"id": "CVE-2020-26145"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-006941"
},
{
"db": "PACKETSTORM",
"id": "164875"
},
{
"db": "PACKETSTORM",
"id": "166568"
},
{
"db": "PACKETSTORM",
"id": "163249"
},
{
"db": "PACKETSTORM",
"id": "163251"
},
{
"db": "PACKETSTORM",
"id": "163253"
},
{
"db": "PACKETSTORM",
"id": "163255"
},
{
"db": "PACKETSTORM",
"id": "163291"
},
{
"db": "PACKETSTORM",
"id": "163301"
},
{
"db": "PACKETSTORM",
"id": "164967"
},
{
"db": "CNNVD",
"id": "CNNVD-202105-631"
},
{
"db": "NVD",
"id": "CVE-2020-26145"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2021-05-14T00:00:00",
"db": "CNVD",
"id": "CNVD-2021-34681"
},
{
"date": "2021-05-11T00:00:00",
"db": "VULMON",
"id": "CVE-2020-26145"
},
{
"date": "2022-01-26T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2021-006941"
},
{
"date": "2021-11-10T17:10:23",
"db": "PACKETSTORM",
"id": "164875"
},
{
"date": "2022-04-01T15:43:33",
"db": "PACKETSTORM",
"id": "166568"
},
{
"date": "2021-06-23T15:33:13",
"db": "PACKETSTORM",
"id": "163249"
},
{
"date": "2021-06-23T15:35:21",
"db": "PACKETSTORM",
"id": "163251"
},
{
"date": "2021-06-23T15:38:23",
"db": "PACKETSTORM",
"id": "163253"
},
{
"date": "2021-06-23T15:41:26",
"db": "PACKETSTORM",
"id": "163255"
},
{
"date": "2021-06-27T12:22:22",
"db": "PACKETSTORM",
"id": "163291"
},
{
"date": "2021-06-28T16:22:26",
"db": "PACKETSTORM",
"id": "163301"
},
{
"date": "2021-11-15T17:25:56",
"db": "PACKETSTORM",
"id": "164967"
},
{
"date": "2021-05-11T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202105-631"
},
{
"date": "2021-05-11T20:15:08.873000",
"db": "NVD",
"id": "CVE-2020-26145"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2021-05-14T00:00:00",
"db": "CNVD",
"id": "CNVD-2021-34681"
},
{
"date": "2022-05-13T00:00:00",
"db": "VULMON",
"id": "CVE-2020-26145"
},
{
"date": "2024-02-27T02:28:00",
"db": "JVNDB",
"id": "JVNDB-2021-006941"
},
{
"date": "2022-05-16T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202105-631"
},
{
"date": "2022-05-13T20:53:57.840000",
"db": "NVD",
"id": "CVE-2020-26145"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "PACKETSTORM",
"id": "166568"
},
{
"db": "PACKETSTORM",
"id": "163249"
},
{
"db": "PACKETSTORM",
"id": "163251"
},
{
"db": "PACKETSTORM",
"id": "163253"
},
{
"db": "PACKETSTORM",
"id": "163255"
},
{
"db": "PACKETSTORM",
"id": "163291"
},
{
"db": "PACKETSTORM",
"id": "163301"
}
],
"trust": 0.7
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Samsung\u00a0Galaxy\u00a0S3\u00a0i9305\u00a0 Vulnerability related to input validation in devices",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2021-006941"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "arbitrary",
"sources": [
{
"db": "PACKETSTORM",
"id": "163249"
},
{
"db": "PACKETSTORM",
"id": "163251"
},
{
"db": "PACKETSTORM",
"id": "163253"
},
{
"db": "PACKETSTORM",
"id": "163255"
},
{
"db": "PACKETSTORM",
"id": "163291"
},
{
"db": "PACKETSTORM",
"id": "163301"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.